TY - GEN
T1 - Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security
AU - Canetti, Ran
AU - Sarkar, Pratik
AU - Wang, Xiao
N1 - Publisher Copyright:
© 2020, International Association for Cryptologic Research.
PY - 2020
Y1 - 2020
N2 - We construct the most efficient two-round adaptively secure bit-OT in the Common Random String (CRS ) model. The scheme is UC secure under the Decisional Diffie-Hellman (DDH) assumption. It incurs O(1 ) exponentiations and sends O(1 ) group elements, whereas the state of the art requires O(κ2) exponentiations and communicates poly (κ) bits, where κ is the computational security parameter. Along the way, we obtain several other efficient UC-secure OT protocols under DDH:The most efficient yet two-round adaptive string-OT protocol assuming global programmable random oracle. Furthermore, the protocol can be made non-interactive in the simultaneous message setting, assuming random inputs for the sender.The first two-round string-OT with amortized constant exponentiations and communication overhead which is secure in the global observable random oracle model.The first two-round receiver equivocal string-OT in the CRS model that incurs constant computation and communication overhead. We also obtain the first non-interactive adaptive string UC-commitment in the CRS model which incurs a sublinear communication overhead in the security parameter. Specifically, we commit to polylog (κ) bits while communicating O(κ) bits. Moreover, it is additively homomorphic. We can also extend our results to the single CRS model where multiple sessions share the same CRS. As a corollary, we obtain a two-round adaptively secure MPC protocol in this model.
AB - We construct the most efficient two-round adaptively secure bit-OT in the Common Random String (CRS ) model. The scheme is UC secure under the Decisional Diffie-Hellman (DDH) assumption. It incurs O(1 ) exponentiations and sends O(1 ) group elements, whereas the state of the art requires O(κ2) exponentiations and communicates poly (κ) bits, where κ is the computational security parameter. Along the way, we obtain several other efficient UC-secure OT protocols under DDH:The most efficient yet two-round adaptive string-OT protocol assuming global programmable random oracle. Furthermore, the protocol can be made non-interactive in the simultaneous message setting, assuming random inputs for the sender.The first two-round string-OT with amortized constant exponentiations and communication overhead which is secure in the global observable random oracle model.The first two-round receiver equivocal string-OT in the CRS model that incurs constant computation and communication overhead. We also obtain the first non-interactive adaptive string UC-commitment in the CRS model which incurs a sublinear communication overhead in the security parameter. Specifically, we commit to polylog (κ) bits while communicating O(κ) bits. Moreover, it is additively homomorphic. We can also extend our results to the single CRS model where multiple sessions share the same CRS. As a corollary, we obtain a two-round adaptively secure MPC protocol in this model.
UR - http://www.scopus.com/inward/record.url?scp=85097899400&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-64840-4_10
DO - 10.1007/978-3-030-64840-4_10
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:85097899400
SN - 9783030648398
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 277
EP - 308
BT - Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings
A2 - Moriai, Shiho
A2 - Wang, Huaxiong
PB - Springer Science and Business Media Deutschland GmbH
T2 - 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020
Y2 - 7 December 2020 through 11 December 2020
ER -