Simple direct reduction of string (1,2)-OT to Rabin's OT without privacy amplification

Kaoru Kurosawa, Takeshi Koshiba

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

It is known that string (1,2)-OT and Rabin's OT are equivalent. Actually, there have been many reductions between them. Many of them use the privacy amplification technique as a basic tool. The privacy amplification technique essentially involves some post-processing of sending random objects (e.g., random indices of pairwise independent hash functions) per each invocation of Rabin's OT is necessary. In this paper, we show a simple direct reduction of string (1,2)-OT to Rabin's OT by using a deterministic randomness extractor for bit-fixing sources. Our reduction can be realized without privacy amplification and thus our protocol is simpler and more efficient with respect to the communication complexity than the previous reductions.

Original languageEnglish
Title of host publicationInformation Theoretic Security - Third International Conference, ICITS 2008, Proceedings
Pages199-209
Number of pages11
DOIs
Publication statusPublished - 2008 Oct 27
Event3rd International Conference on Information Theoretic Security, ICITS 2008 - Calgary, AB, Canada
Duration: 2008 Aug 102008 Aug 13

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5155 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd International Conference on Information Theoretic Security, ICITS 2008
CountryCanada
CityCalgary, AB
Period08/8/1008/8/13

    Fingerprint

Keywords

  • Deterministic randomness extractor
  • Oblivious transfer
  • Privacy amplification
  • Reduction

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Kurosawa, K., & Koshiba, T. (2008). Simple direct reduction of string (1,2)-OT to Rabin's OT without privacy amplification. In Information Theoretic Security - Third International Conference, ICITS 2008, Proceedings (pp. 199-209). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5155 LNCS). https://doi.org/10.1007/978-3-540-85093-9_19