Welcome to the resource topic for 2014/692
Title:
Extending Oblivious Transfer Efficiently, or - How to get active security with constant cryptographic overhead
Authors: Enrique Larraia
Abstract:On top of the passively secure extension protocol of [IKNP03] we build a new construction secure against active adversaries. We can replace the invocation of the hash function that is used to check the receiver is well-behaved with the XOR of bit strings. This is possible by applying a cut-and-choose technique on the length of the bit strings that the receiver sends in the reversed OT. We also improve on the number of seeds required for the extension, both asymptotically and practically. Moreover, the protocol used to test receiver’s behaviour enjoys unconditional security.
ePrint: https://eprint.iacr.org/2014/692
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .