International Association for Cryptologic Research

International Association
for Cryptologic Research


Paper: Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security

Ran Canetti
Pratik Sarkar
Xiao Wang
DOI: 10.1007/978-3-030-64840-4_10
Search ePrint
Search Google
Abstract: We construct the most efficient two-round adaptively secure bit-OT in the Common Random String (CRS) model. The scheme is UC secure under the Decisional Diffie-Hellman (DDH) assumption. It incurs O(1) exponentiations and sends O(1) group elements, whereas the state of the art requires O(k^2) exponentiations and communicates poly(k) bits, where k is the computational security parameter. Along the way, we obtain several other efficient UC-secure OT protocols under DDH : - The most efficient yet two-round adaptive string-OT protocol assuming global programmable random oracle. Furthermore, the protocol can be made non-interactive in the simultaneous message setting, assuming random inputs for the sender. - The fi rst two-round string-OT with amortized constant exponentiations and communication overhead which is secure in the global observable random oracle model. - The first two-round receiver equivocal string-OT in the CRS model that incurs constant computation and communication overhead. We also obtain the first non-interactive adaptive string UC-commitment in the CRS model which incurs a sublinear communication overhead in the security parameter. Speci cally, we commit to polylog(k) bits while communicating O(k) bits. Moreover, it is additively homomorphic. We can also extend our results to the single CRS model where multiple sessions share the same CRS. As a corollary, we obtain a two-round adaptively secure MPC protocol in this model.
Video from ASIACRYPT 2020
  title={Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security},
  booktitle={Advances in Cryptology - ASIACRYPT 2020},
  author={Ran Canetti and Pratik Sarkar and Xiao Wang},