J4

• Original Articles • Previous Articles     Next Articles

Oblivious transfer with extractors

ZHAO Tie-shan;GE Jian-hua;YANG Bo

  

  1. (Ministry of Education Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China)
  • Received:1900-01-01 Revised:1900-01-01 Online:2004-02-20 Published:2004-02-20

Abstract: Reductions among oblivious transfers have a long history in cryptography. This paper describes a (2 1)-1-OTk protocol that can be reduced to a single execution of UOT by using privacy amplification with extranctors. An extractor allows to efficiently isolate the randomness of some source into virtually-random bits, using a small number of perfectly-random bits as a catalyst. With extractors, less information is transmitted and the leaked information is at most 2-n-1/2-o(1) bits. The conditions under which the protocol is unconditionally secure are investigated.

Key words: oblivious transfer, privacy amplification, extractor, unconditional security

CLC Number: 

  • TN918.1