A Novel Bilateral Oblivious Transfer Protocol Based on Cut-and-Choose Technique

被引:0
|
作者
Ning, Lulu [1 ]
Wang, Jian [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
关键词
secure two-party computation; Cut-and-Choose Bilateral OT; the CDH assumption; SECURE 2-PARTY COMPUTATION; EFFICIENT;
D O I
10.1109/BigDataSE50710.2020.00015
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Yao's protocol based on garbled circuits is the foundation of secure two-party computation protocols, and Oblivious Transfer (OT), as a important tool in modern cryptography, plays a crucial role in transmitting garbled keys in the Yao's protocol. In the past decades, considerable attentions have been paid to the Cut-and-Choose technique which is applied to OT protocols to prevent malicious P-1 (called circuit generator) from constructing wrong garbled circuits. Additionally, Bilateral OT becomes a focus point, which can simultaneously transmit P-1 's and P-2 's (called circuit evaluator) garbled keys to guarantee input consistency of two parties and improve transmission efficiency. As can be seen, some Cut-and-Choose Bilateral OT (CCBOT) protocols have been proposed. Since CCBOT has emerged, the probability of malicious P-1 constructing wrong garbled circuits without being found becomes lower and the input consistency problem is properly resolved too. However, the security of most CCBOT protocols are facing challenges since they are based on the Decisional Diffie-Hellman (DDH) assumption, Quadratic Residues (QR) assumption and Decisional Composite Residuosity (DCR) assumption. In this paper, we present a novel CCBOT protocol with the security against malicious adversaries based on the Computational Diffie-Hellman (CDH) assumption, and analysize the correctness, efficiency and security of the constructed protocol. Besides, we analysize the cheating probability of P-1 in the CCBOT and extend the CCBOT to Single-Choice CCBOT to make the protocol more applicable.
引用
收藏
页码:49 / 56
页数:8
相关论文
共 50 条
  • [21] Universally composable oblivious transfer protocol based on VSPH
    Li, Feng-Hua
    Feng, Tao
    Ma, Jian-Feng
    Tongxin Xuebao/Journal on Communications, 2007, 28 (07): : 28 - 34
  • [22] Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique
    Brandao, Luis T. A. N.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 : 441 - 463
  • [23] Fingerprinting protocol based on distributed providers using oblivious transfer
    Shinmyo, Urara
    Kuribayashi, Minoru
    Morii, Masakatu
    Tanaka, Hatsukazu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (10) : 2597 - 2602
  • [24] Quantum security analysis of a lattice-based oblivious transfer protocol
    Liu, Mo-meng
    Kraemer, Juliane
    Hu, Yu-pu
    Buchmann, Johannes
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (09) : 1348 - 1369
  • [25] A LWE-based oblivious transfer protocol from indistinguishability obfuscation
    Zhang, Shanshan
    International Journal of Network Security, 2020, 22 (05): : 801 - 808
  • [26] Quantum security analysis of a lattice-based oblivious transfer protocol
    Mo-meng Liu
    Juliane Krämer
    Yu-pu Hu
    Johannes Buchmann
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1348 - 1369
  • [27] Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer
    Song, Yaqi
    Yang, Li
    APPLIED SCIENCES-BASEL, 2018, 8 (10):
  • [28] An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy
    Jannati, Hoda
    Bahrak, Behnam
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 3113 - 3123
  • [29] An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy
    Hoda Jannati
    Behnam Bahrak
    Wireless Personal Communications, 2017, 97 : 3113 - 3123
  • [30] A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
    Chou, Jue- Sam
    ADVANCES IN MULTIMEDIA, 2012, 2012 (2012)