International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Paper: Efficient Fully-Simulatable Oblivious Transfer

Authors:
Yehuda Lindell
Download:
URL: http://eprint.iacr.org/2008/035
Search ePrint
Search Google
Abstract: Oblivious transfer, first introduced by Rabin, is one of the basic building blocks of cryptographic protocols. In an oblivious transfer (or more exactly, in its 1-out-of-2 variant), one party known as the sender has a pair of messages and the other party known as the receiver obtains one of them. Somewhat paradoxically, the receiver obtains exactly one of the messages (and learns nothing of the other), and the sender does not know which of the messages the receiver obtained. Due to its importance as a building block for secure protocols, the efficiency of oblivious transfer protocols has been extensively studied. However, to date, there are almost no known oblivious transfer protocols that are secure in the presence of \emph{malicious adversaries} under the \emph{real/ideal model simulation paradigm} (without using general zero-knowledge proofs). Thus, \emph{efficient protocols} that reach this level of security are of great interest. In this paper we present efficient oblivious transfer protocols that are secure according to the ideal/real model simulation paradigm. We achieve constructions under the DDH, $N$th residuosity and quadratic residuosity assumptions, as well as under the assumption that homomorphic encryption exists.
BibTeX
@misc{eprint-2008-17712,
  title={Efficient Fully-Simulatable Oblivious Transfer},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols / oblivious transfer},
  url={http://eprint.iacr.org/2008/035},
  note={Extended abstract appeared at CT-RSA 2008. lindell@cs.biu.ac.il 13902 received 24 Jan 2008},
  author={Yehuda Lindell},
  year=2008
}