A Novel Bilateral Oblivious Transfer Protocol Based on Cut-and-Choose Technique

被引:0
|
作者
Ning, Lulu [1 ]
Wang, Jian [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
关键词
secure two-party computation; Cut-and-Choose Bilateral OT; the CDH assumption; SECURE 2-PARTY COMPUTATION; EFFICIENT;
D O I
10.1109/BigDataSE50710.2020.00015
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Yao's protocol based on garbled circuits is the foundation of secure two-party computation protocols, and Oblivious Transfer (OT), as a important tool in modern cryptography, plays a crucial role in transmitting garbled keys in the Yao's protocol. In the past decades, considerable attentions have been paid to the Cut-and-Choose technique which is applied to OT protocols to prevent malicious P-1 (called circuit generator) from constructing wrong garbled circuits. Additionally, Bilateral OT becomes a focus point, which can simultaneously transmit P-1 's and P-2 's (called circuit evaluator) garbled keys to guarantee input consistency of two parties and improve transmission efficiency. As can be seen, some Cut-and-Choose Bilateral OT (CCBOT) protocols have been proposed. Since CCBOT has emerged, the probability of malicious P-1 constructing wrong garbled circuits without being found becomes lower and the input consistency problem is properly resolved too. However, the security of most CCBOT protocols are facing challenges since they are based on the Decisional Diffie-Hellman (DDH) assumption, Quadratic Residues (QR) assumption and Decisional Composite Residuosity (DCR) assumption. In this paper, we present a novel CCBOT protocol with the security against malicious adversaries based on the Computational Diffie-Hellman (CDH) assumption, and analysize the correctness, efficiency and security of the constructed protocol. Besides, we analysize the cheating probability of P-1 in the CCBOT and extend the CCBOT to Single-Choice CCBOT to make the protocol more applicable.
引用
收藏
页码:49 / 56
页数:8
相关论文
共 50 条
  • [31] Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer
    Kiraz, Mehmet Sabir
    Genc, Ziya Alper
    Kardas, Suleyman
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4123 - 4135
  • [32] Quantum Oblivious Transfer Based on a Quantum Symmetrically Private Information Retrieval Protocol
    Yang, Yu-Guang
    Sun, Si-Jia
    Wang, Yan
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2015, 54 (03) : 910 - 916
  • [33] SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer
    Karakoc, Ferhat
    Nateghizad, Majid
    Erkin, Zekeriya
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [34] Quantum Oblivious Transfer Based on a Quantum Symmetrically Private Information Retrieval Protocol
    Yu-Guang Yang
    Si-Jia Sun
    Yan Wang
    International Journal of Theoretical Physics, 2015, 54 : 910 - 916
  • [35] A privacy-preserving digital rights management protocol based on oblivious transfer scheme
    Jiang Y.
    Yang B.
    International Journal of Digital Content Technology and its Applications, 2011, 5 (05) : 337 - 341
  • [36] Quantum Anonymous Authenticated Key Exchange Protocol Based on Quantum Oblivious Key Transfer
    Wei Chunyan
    Cai Xiaoqiu
    Wang Tianyin
    Su Qi
    Qin Sujuan
    Gao Fei
    Wen Qiaoyan
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (02) : 341 - 347
  • [37] A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer
    Rial, Alfredo
    Balasch, Josep
    Preneel, Bart
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 202 - 212
  • [38] Towards Wireless Security without Computational Assumptions -An Oblivious Transfer Protocol Based on an Unauthenticated Wireless Channel
    Hao, Zhuo
    Zhong, Sheng
    Li, Li Erran
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 2156 - 2164
  • [39] A Privacy-Preserving Method Based on Server-Aided Reverse Oblivious Transfer Protocol in MCS
    Long, Hao
    Zhang, Shukui
    Zhang, Yang
    Zhang, Li
    Wang, Jin
    IEEE ACCESS, 2019, 7 : 164667 - 164681
  • [40] A Novel Edge Cache-Based Private Set Intersection Protocol via Lightweight Oblivious PRF
    Zhang, Jing
    Yang, Li
    Tang, Yongli
    Jin, Minglu
    Wang, Shujing
    ENTROPY, 2023, 25 (09)