TY - GEN
T1 - Strengthening the security of distributed oblivious transfer
AU - Cheong, K. Y.
AU - Koshiba, Takeshi
AU - Nishiyama, Shohei
PY - 2009/11/9
Y1 - 2009/11/9
N2 - We study the distributed oblivious transfer first proposed by Naor and Pinkas in ASIACRYPT 2000, and generalized by Blundo et al. originally in SAC 2002 and Nikov et al. in INDOCRYPT 2002. One major objective of distributed oblivious transfer is to achieve information theoretic security under specified conditions through the distribution of the functions of traditional oblivious transfer to a set of neutral parties. In this paper we revise the definition of distributed oblivious transfer in order to deal with stronger adversaries and clarify possible ambiguities. Under the new definition, we observe some impossibility results and derive the upper bounds for the system parameters (with respect to the size of coalition). The weak points of previously proposed schemes based on threshold secret sharing schemes using polynomial interpolation are reviewed and resolved. We generalize the results and prove that, by adjusting some technical details, a previous scheme proposed by Nikov et al. is unconditionally secure. This protocol is efficient and achieves the parameter bounds at the same time.
AB - We study the distributed oblivious transfer first proposed by Naor and Pinkas in ASIACRYPT 2000, and generalized by Blundo et al. originally in SAC 2002 and Nikov et al. in INDOCRYPT 2002. One major objective of distributed oblivious transfer is to achieve information theoretic security under specified conditions through the distribution of the functions of traditional oblivious transfer to a set of neutral parties. In this paper we revise the definition of distributed oblivious transfer in order to deal with stronger adversaries and clarify possible ambiguities. Under the new definition, we observe some impossibility results and derive the upper bounds for the system parameters (with respect to the size of coalition). The weak points of previously proposed schemes based on threshold secret sharing schemes using polynomial interpolation are reviewed and resolved. We generalize the results and prove that, by adjusting some technical details, a previous scheme proposed by Nikov et al. is unconditionally secure. This protocol is efficient and achieves the parameter bounds at the same time.
KW - Information theoretic security
KW - Oblivious transfer
KW - Secret sharing scheme
UR - http://www.scopus.com/inward/record.url?scp=70350634207&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70350634207&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-02620-1_26
DO - 10.1007/978-3-642-02620-1_26
M3 - Conference contribution
AN - SCOPUS:70350634207
SN - 3642026192
SN - 9783642026195
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 377
EP - 388
BT - Information Security and Privacy - 14th Australasian Conference, ACISP 2009, Proceedings
T2 - 14th Australasian Conference on Information Security and Privacy, ACISP 2009
Y2 - 1 July 2009 through 3 July 2009
ER -