2008
DOI: 10.1007/978-3-540-78524-8_22
|View full text |Cite
|
Sign up to set email alerts
|

OT-Combiners via Secure Computation

Abstract: Abstract. An OT-combiner implements a secure oblivious transfer (OT) protocol using oracle access to n OT-candidates of which at most t may be faulty. We introduce a new general approach for combining OTs by making a simple and modular use of protocols for secure computation. Specifically, we obtain an OT-combiner from any instantiation of the following two ingredients: (1) a t-secure n-party protocol for the OT functionality, in a network consisting of secure point-to-point channels and a broadcast primitive;… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

5
68
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 72 publications
(73 citation statements)
references
References 44 publications
(104 reference statements)
5
68
0
Order By: Relevance
“…This assumption has been introduced in [16] and was used there for providing security against malicious adversaries for a method of extending oblivious transfer. The correlation robustness assumption has been recently used in the context of oblivious transfer [14,17] and in the context of secure computation [19,26].…”
Section: Encryption Schemementioning
confidence: 99%
“…This assumption has been introduced in [16] and was used there for providing security against malicious adversaries for a method of extending oblivious transfer. The correlation robustness assumption has been recently used in the context of oblivious transfer [14,17] and in the context of secure computation [19,26].…”
Section: Encryption Schemementioning
confidence: 99%
“…For the inner protocol we use: GMW [GMW87] semi-honest secure protocol in F OT -hybrid. And the F OT instances are in turn obtained by using the constant-rate semi-honest OT combiner of Harnik et al [HIKN08].…”
Section: If the Receiver Uses Inputs Frommentioning
confidence: 99%
“…Therefore, A(q) > 2d if q is (very) large. 7 The asymptotical result from [7] plays an important communication-saving role in two-party cryptography, see [23,24,18,22,13,21]. Often, the point is that terms in the communication analysis which would otherwise be logarithmic can be made constant using the [7] results.…”
Section: If the N-code C * I Is T-disconnected And If C * J Has (N − mentioning
confidence: 99%
“…A series of surprising results, concerning zero-knowledge for circuit satisfiability ("MPC in the Head"), two-party secure computation, OT-combiners, correlation extractors, and OT from noisy channels [23,24,18,22,13,21], has caused nothing less than a paradigm shift that perhaps appears even as counter-intuitive: secure multi-party computation is a very powerful abstract primitive for communication-efficient two-party cryptography. All these results use arithmetic secret sharing schemes, typically with d = 2 (see also [11] for an application with d > 2).…”
Section: Introductionmentioning
confidence: 99%