A game-theoretic perspective on oblivious transfer

  • Authors:
  • Haruna Higo;Keisuke Tanaka;Akihiro Yamada;Kenji Yasunaga

  • Affiliations:
  • Tokyo Institute of Technology, Japan;Tokyo Institute of Technology, Japan;Tokyo Institute of Technology, Japan;Institute of Systems, Information Technologies and Nanotechnologies, Japan

  • Venue:
  • ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Asharov, Canetti, and Hazay (Eurocrypt 2011) studied how game-theoretic concepts can be used to capture the cryptographic properties of correctness, privacy, and fairness in two-party protocols in the presence of fail-stop adversaries. Based on their work, we characterize the properties of "two-message" oblivious transfer protocols by using a game-theoretic concept. Specifically, we present a single two-player game for two-message oblivious transfer in the game-theoretic framework, where it captures the cryptographic properties of correctness and privacy in the presence of malicious adversaries.