The Community for Technology Leaders
Green Image
<p><b>Abstract</b>—In this paper, we propose efficient and secure (string) oblivious transfer (<tmath>OT_n^1</tmath>) schemes for any <tmath>n\geq 2</tmath>. We build our <tmath>OT_n^1</tmath> scheme from fundamental cryptographic techniques directly. The receiver's choice is unconditionally secure and the secrecy of the unchosen secrets is based on the hardness of the decisional Diffie-Hellman problem. Some schemes achieve optimal efficiency in terms of the number of rounds and the total number of exchanged messages for the case that the receiver's choice is unconditionally secure. The distinct feature of our scheme is that the system-wide parameters are independent of <tmath>n</tmath> and <it>universally usable</it>, that is, all possible receivers and senders use the same parameters and need no trapdoors specific to each of them. We extend our <tmath>OT_n^1</tmath> schemes to distributed oblivious transfer schemes. Our distributed <tmath>OT_n^1</tmath> schemes take full advantage of the research results of secret sharing. For applications, we present a method of transforming any (single-database) PIR protocol into a symmetric PIR protocol by slightly increasing the communication cost only.</p>
Oblivious transfer, distributed oblivious transfer, private information retrieval.
Wen-Guey Tzeng, "Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters", IEEE Transactions on Computers, vol. 53, no. , pp. 232-240, February 2004, doi:10.1109/TC.2004.1261831
88 ms
(Ver 3.3 (11022016))