Presentation 2009-05-26
Strengthening the Security of Distributed Oblivious Transfer
K. Y. CHEONG, Takeshi KOSHIBA, Shohei NISHIYAMA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We study the distributed oblivious transfer first proposed by Naor and Pinkas in ASIACRYPT 2000, and generalized by Blundo et al. originally in SAC 2002 and Nikov et al. in INDOCRYPT 2002. One major objective of distributed oblivious transfer is to achieve information theoretic security under specified conditions through the distribution of the functions of traditional oblivious transfer to a set of neutral parties. In this paper we revise the definition of distributed oblivious transfer in order to deal with stronger adversaries and clarify possible ambiguities. Under the new definition, we observe some impossibility results and derive the upper bounds for the system parameters (with respect to the size of coalition). The weak points of previously proposed schemes based on threshold secret sharing schemes using polynomial interpolation are reviewed and resolved. We generalize the results and prove that, by adjusting some technical details, a previous scheme proposed by Nikov et al. is unconditionally secure. This protocol is efficient and achieves the parameter bounds at the same time.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) oblivious transfer / secret sharing scheme / information theoretic security
Paper # COMP2009-11
Date of Issue

Conference Information
Committee COMP
Conference Date 2009/5/19(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Theoretical Foundations of Computing (COMP)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Strengthening the Security of Distributed Oblivious Transfer
Sub Title (in English)
Keyword(1) oblivious transfer
Keyword(2) secret sharing scheme
Keyword(3) information theoretic security
1st Author's Name K. Y. CHEONG
1st Author's Affiliation Division of Mathematics, Electronics and Informatics, Graduate School of Science and Engineering, Saitama University()
2nd Author's Name Takeshi KOSHIBA
2nd Author's Affiliation Division of Mathematics, Electronics and Informatics, Graduate School of Science and Engineering, Saitama University
3rd Author's Name Shohei NISHIYAMA
3rd Author's Affiliation Division of Mathematics, Electronics and Informatics, Graduate School of Science and Engineering, Saitama University
Date 2009-05-26
Paper # COMP2009-11
Volume (vol) vol.109
Number (no) 54
Page pp.pp.-
#Pages 7
Date of Issue