A Novel Bilateral Oblivious Transfer Protocol Based on Cut-and-Choose Technique

被引:0
|
作者
Ning, Lulu [1 ]
Wang, Jian [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
关键词
secure two-party computation; Cut-and-Choose Bilateral OT; the CDH assumption; SECURE 2-PARTY COMPUTATION; EFFICIENT;
D O I
10.1109/BigDataSE50710.2020.00015
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Yao's protocol based on garbled circuits is the foundation of secure two-party computation protocols, and Oblivious Transfer (OT), as a important tool in modern cryptography, plays a crucial role in transmitting garbled keys in the Yao's protocol. In the past decades, considerable attentions have been paid to the Cut-and-Choose technique which is applied to OT protocols to prevent malicious P-1 (called circuit generator) from constructing wrong garbled circuits. Additionally, Bilateral OT becomes a focus point, which can simultaneously transmit P-1 's and P-2 's (called circuit evaluator) garbled keys to guarantee input consistency of two parties and improve transmission efficiency. As can be seen, some Cut-and-Choose Bilateral OT (CCBOT) protocols have been proposed. Since CCBOT has emerged, the probability of malicious P-1 constructing wrong garbled circuits without being found becomes lower and the input consistency problem is properly resolved too. However, the security of most CCBOT protocols are facing challenges since they are based on the Decisional Diffie-Hellman (DDH) assumption, Quadratic Residues (QR) assumption and Decisional Composite Residuosity (DCR) assumption. In this paper, we present a novel CCBOT protocol with the security against malicious adversaries based on the Computational Diffie-Hellman (CDH) assumption, and analysize the correctness, efficiency and security of the constructed protocol. Besides, we analysize the cheating probability of P-1 in the CCBOT and extend the CCBOT to Single-Choice CCBOT to make the protocol more applicable.
引用
收藏
页码:49 / 56
页数:8
相关论文
共 50 条
  • [1] Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption
    Jiang H.
    Xu Q.
    Liu C.
    Zheng Z.
    Tang Y.
    Wang M.
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (02) : 1327 - 1337
  • [2] Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE
    Ding, Hangchao
    Jiang, Han
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [3] An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol
    Tang, Yongli
    Guo, Menghao
    Huo, Yachao
    Zhao, Zongqu
    Yu, Jinxia
    Qin, Baodong
    ENTROPY, 2024, 26 (09)
  • [4] Cut-and-Choose Bilateral Oblivious Transfer and Its Application
    Zhao, Chuan
    Jiang, Han
    Wei, Xiaochao
    Xu, Qiuliang
    Zhao, Minghao
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 384 - 391
  • [5] Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries
    Wei, Xiaochao
    Jiang, Han
    Zhao, Chuan
    Zhao, Minghao
    Xu, Qiuliang
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 418 - 425
  • [6] On Cut-and-Choose Oblivious Transfer and Its Variants
    Kolesnikov, Vladimir
    Kumaresan, Ranjit
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 386 - 412
  • [7] Permutable Cut-and-Choose Oblivious Transfer and Its Application
    Wei, Xiaochao
    Xu, Lin
    Wang, Hao
    Zheng, Zhihua
    IEEE ACCESS, 2020, 8 : 17378 - 17389
  • [8] Several Oblivious Transfer Variants in Cut-and-Choose Scenario
    Zhao, Chuan
    Jiang, Han
    Xu, Qiuliang
    Wei, Xiaochao
    Wang, Hao
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2015, 9 (02) : 1 - 12
  • [9] Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer
    Wei, Xiaochao
    Xu, Lin
    Zhao, Minghao
    Wang, Hao
    INFORMATION SCIENCES, 2020, 529 : 132 - 140
  • [10] RETRACTED: Secure Two-Party Computation Based on Fast Cut-and-Choose Bilateral Oblivious Transfer (Retracted Article)
    Wang, Yongjun
    Xiong, Kun
    Tian, He
    Zhang, Jing
    Yan, Xixi
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022