Abstract
This paper studies constructions of $k \choose 1$ - oblivious transfer protocols in a black-box way. The security of $k \choose 1$ - oblivious transfer protocols is defined in the real/ideal world simulation paradigm (i.e., the security employs the real/ideal world paradigm for both senders and receivers and thus our construction is fully-simulatable). The idea behind of our constructions is that we first extend the notion of privacy for defensible adversaries in the context of bit-transfer protocols by Ishai, Kushilevitz, Lindell and Petrank at STOC'2006 to the notion of privacy for defensible adversaries in the context of $k \choose 1$-oblivious transfer protocols, and then propose black-box constructions of $k \choose 1$- oblivious transfer protocols secure against defensible adversaries. Finally, we boost the security of our protocols in order to obtain protocols that are secure against malicious adversaries in the fully-simulatable paradigm. We prove that there exist protocols for secure $k \choose 1$ - oblivious transfer without an honest majority and in the presence of static malicious adversaries that rely only on black-box access to a homomorphic encryption scheme. By applying the well-known results of Kilian, we further claim that there exist protocols for secure computation without an honest majority and in the presence of static malicious adversaries that rely only on black-box access to a homomorphic encryption scheme.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.