Presentation 2000/11/6
Multi Party Protocols with Oblivious Transfer
Muller-Quada Jorn, Hideki Imai,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) With oblivious transfer multi party protocols become possible even in the presence of a faulty majority. But all known protocols can be aborted by just one disruptor. This paper presents more robust solutions for multi party protocols with oblivious transfer. This additional robustness against disruptors weakens the security of the protocol such that we can observe a trade off between robustness and security. We give an application to quantum multi party protocols. These allow the implementation of oblivious transfer and the protocols of this paper relative to temporary assumptions, i.e., the security increases after the termination of the protocol.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Multi party protocols / oblivious transfer / general adversary structure
Paper # ISEC2000-94
Date of Issue

Conference Information
Committee ISEC
Conference Date 2000/11/6(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Multi Party Protocols with Oblivious Transfer
Sub Title (in English)
Keyword(1) Multi party protocols
Keyword(2) oblivious transfer
Keyword(3) general adversary structure
1st Author's Name Muller-Quada Jorn
1st Author's Affiliation Institute of Industrial Science University of Tokyo()
2nd Author's Name Hideki Imai
2nd Author's Affiliation Institute of Industrial Science University of Tokyo
Date 2000/11/6
Paper # ISEC2000-94
Volume (vol) vol.100
Number (no) 421
Page pp.pp.-
#Pages 8
Date of Issue