Scalar product-based distributed oblivious transfer
Corniaux, Christian L.F., and Ghodosi, Hossein (2011) Scalar product-based distributed oblivious transfer. Lecture Notes in Computer Science, 6829. pp. 338-354.
PDF (Published Version)
- Published Version
Restricted to Repository staff only |
Abstract
In a distributed oblivious transfer (DOT) the sender is replaced with m servers, and the receiver must contact k (k ≤ m) of these servers to learn the secret of her choice. Naor and Pinkas introduced the first unconditionally secure DOT for a sender holding two secrets. Blundo, D'Arco, Santis, and Stinson generalized Naor and Pinkas’s protocol, in the case that the sender holds n secrets, in the first so-called (k, m)-DOT- protocol. Such a protocol should be secure against a coalition of less than k parties. However, Blundo et al. have shown that this level of security is impossible to achieve in one-round polynomial-based constructions.
In this paper, we show that if communication is allowed amongst the servers, we are able to construct an unconditionally secure, polynomial-based (k, m)-DOT- protocol with the highest level of security. More precisely, in our construction, a receiver who contacts k servers and corrupt up to k − 1 servers (not necessarily from the set of the contacted servers) cannot learn more than one secret.
Item ID: | 18852 |
---|---|
Item Type: | Article (Research - C1) |
ISSN: | 1611-3349 |
Keywords: | oblivious transfer, unconditional security, secret sharing scheme |
Related URLs: | |
Date Deposited: | 31 Oct 2011 11:27 |
FoR Codes: | 08 INFORMATION AND COMPUTING SCIENCES > 0805 Distributed Computing > 080503 Networking and Communications @ 100% |
SEO Codes: | 89 INFORMATION AND COMMUNICATION SERVICES > 8903 Information Services > 890399 Information Services not elsewhere classified @ 100% |
Downloads: |
Total: 10 |
More Statistics |