Oblivious transfers and intersecting codes

被引:62
作者
Brassard, G
Crepeau, C
Santha, M
机构
[1] ECOLE NORMALE SUPER, CNRS, URA 1327, LAB INFORMAT, F-75230 PARIS 05, FRANCE
[2] UNIV PARIS 11, RECH INFORMAT LAB, F-91405 ORSAY, FRANCE
基金
加拿大自然科学与工程研究理事会;
关键词
cryptography; oblivious transfer; intersecting codes; algebraic-geometric codes; information theory;
D O I
10.1109/18.556673
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Assume A owns t secret k-bit strings. She is willing to disclose one of them to B, at his choosing, provided he does not learn anything about the other strings. Conversely, a does not want A to learn which secret he chose to learn. A protocol for the above task is said to implement One-out-of-t String Oblivious Transfer, denoted ((t)(1))-OT2k. This primitive is particularly useful in a variety of cryptographic settings. An apparently simpler task corresponds to the case k = 1 and t = 2 of two 1-bit secrets: this is known as One-out-of-two Bit Oblivious Transfer, denoted ((2)(1))-OT2. We address the question of implementing ((t)(1))-OT2k assuming the existence of a ((2)(1))-OT2. In particular, we prove that unconditionally secure ((2)(1))-OT2k can be implemented from Theta(k) calls to ((2)(1))-OT2. This is optimal up to a small multiplicative constant. Our solution is based on the notion of self-intersecting codes. Of independent interest, we give several efficient new constructions for such codes. Another contribution of this paper is a set of information-theoretic definitions for correctness and privacy of unconditionally secure oblivious transfer.
引用
收藏
页码:1769 / 1780
页数:12
相关论文
共 43 条
[1]  
Beaver D., 1991, Journal of Cryptology, V4, P75, DOI 10.1007/BF00196771
[2]  
Bellare M., 1990, Advances in Cryptology - CRYPTO '89. Proceedings, P547
[3]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[4]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[5]  
Brassard G., 1986, 27th Annual Symposium on Foundations of Computer Science (Cat. No.86CH2354-9), P168, DOI 10.1109/SFCS.1986.26
[6]  
BRASSARD G, 1996, UNPUB OBLIVIOUS TRAN
[7]  
CLEVE R, 1990, LECT NOTES COMPUT SC, V435, P573
[8]   LINEAR INTERSECTING CODES [J].
COHEN, G ;
LEMPEL, A .
DISCRETE MATHEMATICS, 1985, 56 (01) :35-43
[9]   INTERSECTING CODES AND INDEPENDENT FAMILIES [J].
COHEN, GD ;
ZEMOR, G .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (06) :1872-1881
[10]  
Crepeau C., 1988, Advances in Cryptology - CRYPTO '87. Proceedings, P350