Constant-Round Oblivious Transfer in the Bounded Storage Model

Yan Zong Ding, Danny Harnik, Alon Rosen, Ronen Shaltie

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

We present a constant round protocol for Oblivious Transfer in Maurer's bounded storage model. In this model, a long random string R. is initially transmitted and each of the parties interacts based on a small portion of R. Even though the portions stored by the honest parties are small, security is guaranteed against any malicious party that remembers almost all of the string R. Previous constructions for Oblivious Transfer in the bounded storage model required polynomially many rounds of interaction. Our protocol has only 5 messages. We also improve other parameters, such as the number of bits transferred and the probability of immaturely aborting the protocol due to failure. Our techniques utilize explicit constructions from the theory of derandomization. In particular, we use constructions of almost t-wise independent permutations, randomness extractors and averaging samplers.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsMoni Naor
PublisherSpringer Verlag
Pages446-472
Number of pages27
ISBN (Print)3540210008, 9783540210009
DOIs
StatePublished - 2004
Externally publishedYes

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2951
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Constant-Round Oblivious Transfer in the Bounded Storage Model'. Together they form a unique fingerprint.

Cite this