首页> 外文会议>Cryptology and Network Security >Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols
【24h】

Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols

机译:完全可模拟的遗忘传输协议的黑匣子构造

获取原文
获取原文并翻译 | 示例

摘要

This paper studies constructions of (_1~k) - oblivious transfer protocols in a black-box way. The security of (_1~k) - oblivious transfer protocols is defined in the real/ideal world simulation paradigm (i.e., the security employs the real/ideal world paradigm for both senders and receivers and thus our construction is fully-simulatable). The idea behind of our constructions is that we first extend the notion of privacy for defensible adversaries in the context of bit-transfer protocols by Ishai, Kushilevitz, Lindell and Petrank at STOC'2006 to the notion of privacy for defensible adversaries in the context of (_1~k)-oblivious transfer protocols, and then propose black-box constructions of (~1~k)- oblivious transfer protocols secure against defensible adversaries. Finally, we boost the security of our protocols in order to obtain protocols that are secure against malicious adversaries in the fully-simulatable paradigm. We prove that there exist protocols for secure (_1~k) - oblivious transfer without an honest majority and in the presence of static malicious adversaries that rely only on black-box access to a homomorphic encryption scheme. By applying the well-known results of Kilian, we further claim that there exist protocols for secure computation without an honest majority and in the presence of static malicious adversaries that rely only on black-box access to a homomorphic encryption scheme.
机译:本文以黑盒方式研究(_1〜k)-遗忘传输协议的构造。 (_1〜k)遗忘的传输协议的安全性是在真实/理想世界模拟范式中定义的(即,安全性对发送者和接收者都使用了真实/理想世界范式,因此我们的构造是完全可模拟的)。我们的结构背后的想法是,首先在STOC'2006的Ishai,Kushilevitz,Lindell和Petrank的位传输协议的背景下,将可防御对手的隐私权概念扩展到在以下情况下可防御对手的隐私权概念: (_1〜k)-遗忘的传输协议,然后提出(〜1〜k)-遗忘的传输协议的黑盒构造,以防防御对手。最后,我们提高了协议的安全性,以获得在完全可模拟的范式中针对恶意对手安全的协议。我们证明存在用于安全(_1〜k)的协议-在没有诚实多数的情况下存在遗忘的传输,并且存在静态恶意对手,这些恶意对手仅依赖于对同态加密方案的黑匣子访问。通过应用Kilian的众所周知的结果,我们进一步声称,存在一种无需诚实即可获得安全计算的协议,并且存在静态恶意对手,这些恶意对手仅依赖黑盒访问同态加密方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号