Skip to main content

Oblivious Transfer and n-Variate Linear Function Evaluation

  • Conference paper
Computing and Combinatorics (COCOON 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6842))

Included in the following conference series:

  • 887 Accesses

Abstract

We define a new cryptographic primitive which is called Oblivious n-variate Linear Function Evaluation with choice space \(\mathcal{C}\) and denoted by \(\mathcal{C}\text{-}{\rm OLFE}_{n}\). The primitive captures a variety of well-known cryptographic primitives and is an interesting stepstone in secure protocol design. We present a statistically secure reduction from \({n\choose 1}\)-OT to kn invocations of \(\mathcal{C}\text{-}{\rm OLFE}_{n}\), where k is the security parameter and \(\mathcal{C}\) contains all unit vectors of length n. The reduction allows us to reverse \({n\choose 1}\)-OT for any integer nā€‰ā‰„ā€‰2.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97ā€“109. Springer, Heidelberg (1995)

    Google Scholar 

  2. Bennett, C.H., Brassard, G., CrĆ©peau, C., Skubiszewska, H.: Practical quantum oblivious transfer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 351ā€“366. Springer, Heidelberg (1992)

    Google Scholar 

  3. Brassard, G., CrĆ©peau, C., Robert, J.M.: Information theoretic reductions among disclosure problems. In: FOCS 1986, pp. 168ā€“173. IEEE, Los Alamitos (1986)

    Google Scholar 

  4. Brassard, G., CrĆ©peau, C., Robert, J.M.: All-or-nothing disclosure of secrets. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 234ā€“238. Springer, Heidelberg (1987)

    Chapter  Google Scholar 

  5. Brassard, G., CrĆ©peau, C., Wolf, S.: Oblivious transfers and privacy amplification. Journal of Cryptology 16(4), 219ā€“237 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  6. Cachin, C.: On the foundations of oblivious transfer. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 361ā€“374. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  7. Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143ā€“202 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  8. CrĆ©peau, C.: Equivalence between two flavors of oblivious transfers. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 350ā€“354. Springer, Heidelberg (1988)

    Google Scholar 

  9. CrĆ©peau, C., SĆ”ntha, M.: On the reversibility of oblivious transfer. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 106ā€“113. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  10. Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Communications of the ACM 28(6), 637ā€“647 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  11. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC 1987, pp. 218ā€“229. ACM, New York (1987)

    Google Scholar 

  12. Kilian, J.: Founding cryptography on oblivious transfer. In: STOC 1988, pp. 20ā€“31. ACM, New York (1988)

    Google Scholar 

  13. Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: STOC 1999, pp. 245ā€“354. ACM, New York (1999)

    Google Scholar 

  14. Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University (1981)

    Google Scholar 

  15. Yao, A.C.C.: How to generate and exchange secrets. In: FOCS 1986, pp. 162ā€“167. IEEE, Los Alamitos (1986)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chee, Y.M., Wang, H., Zhang, L.F. (2011). Oblivious Transfer and n-Variate Linear Function Evaluation. In: Fu, B., Du, DZ. (eds) Computing and Combinatorics. COCOON 2011. Lecture Notes in Computer Science, vol 6842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22685-4_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22685-4_54

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22684-7

  • Online ISBN: 978-3-642-22685-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics