Efficient Oblivious Transfer in the Bounded-Storage Model

  • Authors:
  • Dowon Hong;Ku-Young Chang;Heuisu Ryu

  • Affiliations:
  • -;-;-

  • Venue:
  • ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we propose an efficient OT1N scheme in the bounded storage model, which is provably secure without complexity assumptions. Under the assumption that a public random string of M bits is broadcasted, the protocol is secure against any computationally unbounded dishonest receiver who can store 驴M bits, 驴 N 驴 O(驴kM) bits, where k is a security parameter. When N = 2, our protocol is similar to that of Ding [10] but has more efficient round and communication complexities. Moreover, in case of N 2, if the sender and receiver can store N 驴 O(驴kM) bits, we are able to construct a protocol for OT1N which has almost the same complexity as in OT12 scheme. Ding's protocol was constructed by using the interactive hashing protocol which is introduced by Noar, Ostrovsky, Venkatesan and Yung [15] with very large roundcomplexity. We propose an efficiently extended interactive hashing and analyze its security. This protocol answers partially an open problem raised in [10].