Semi-honest to malicious oblivious transfer-the black-box way

Iftach Haitner*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Until recently, all known constructions of oblivious transfer protocols based on general hardness assumptions had the following form. First, the hardness assumption is used in a black-box manner (i.e., the construction uses only the input/output behavior of the primitive guaranteed by the assumption) to construct a semi-honest oblivious transfer, a protocol whose security is guaranteed to hold only against adversaries that follow the prescribed protocol. Then, the latter protocol is "compiled" into a (malicious) oblivious transfer using non-black techniques (a Karp reduction is carried in order to prove an NP statement in zero-knowledge). In their recent breakthrough result, Ishai, Kushilevitz, Lindel and Petrank (STOC '06) deviated from the above paradigm, presenting a black-box reduction from oblivious transfer to enhanced trapdoor permutations and to homomorphic encryption. Here we generalize their result, presenting a black-box reduction from oblivious transfer to semi-honest oblivious transfer. Consequently, oblivious transfer can be black-box reduced to each of the hardness assumptions known to imply a semi-honest oblivious transfer in a black-box manner. This list currently includes beside the hardness assumptions used by Ishai et al., also the existence of families of dense trapdoor permutations and of non trivial single-server private information retrieval.

Original languageEnglish
Title of host publicationTheory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings
Pages412-426
Number of pages15
DOIs
StatePublished - 2008
Externally publishedYes
Event5th Theory of Cryptography Conference, TCC 2008 - New York, United States
Duration: 19 Mar 200821 Mar 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4948 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th Theory of Cryptography Conference, TCC 2008
Country/TerritoryUnited States
CityNew York
Period19/03/0821/03/08

Fingerprint

Dive into the research topics of 'Semi-honest to malicious oblivious transfer-the black-box way'. Together they form a unique fingerprint.

Cite this