Abstract
This paper investigates oblivious transfer protocol based on privacy amplification that uses Rényi entropy of order α for any 1α 2, the conditions under which the protocol is secure are given. In protocol it makes no assumptions about receiver’s computing power, so under the given conditions the protocol is unconditionally-secure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. O. Rabin. How to exchange secrets by oblivious transfer, Tech. Report TR-81, Harvard, 1981.
Shimon Even, Oded Goldreich, and A. Lempel. A randomized protocol for signing contracts, CRYPTO’82, Plenum Press, 1983, 205–210.
Gilles Brassard, Claude Crépeau, and Jean-Marc Robert, Information theoretic reductions among disclosure problems, Proc. 27th IEEE Symposium on Foundations of Computer Science, 1986,168–173.
Christian Cachin. On the foundations of oblivious transfer, EUROCRYPT’98, Lecture Notes in Computer Science, Springer-Verlag, 1998, 361–374.
Gilles Brassard, Claude Crépeau. Oblivious transfer and privacy amplification, EUROCRYPT’ 97, Lecture Notes in Computer Science, Springer-Verlag, 1997, 334–347.
Charles H. Bennett, Gilles Brassard, Claude Crépeau, and Ueli M. Maurer. Generalized Privacy amplification, IEEE Trans. Inform. Theory, 1995, 41 (6): 1915–1923.
Bo Yang, Tong Zhang and Yumin Wang. Distillation of Unconditionally-Secure Secret-Key Based on Smooth Entropy. Acta Electronica Sinica, 2001, 29(7).
Bo Yang, Tong Zhang and Yumin Wang. Distillation of Unconditionally-Secure Secret-Key against Active Adversaries Based on Smooth Entropy. Acta Electronica Sinica, accepted to publish.
Christian Cachin. Smooth entropy and Rényi entropy, EUROCRYPT’97, Lecture Notes in Computer Science, Springer-Verlag, 1997, 193–208.
J. L. Carter and M. N. Wegman. Universal classes of hash functions, J.Comput.Syst.Sci., 1979, 18 (2): 143–154.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, B., Zhu, S., Wang, Y. (2001). Unconditionally-Secure Oblivious Transfer. In: Qing, S., Okamoto, T., Zhou, J. (eds) Information and Communications Security. ICICS 2001. Lecture Notes in Computer Science, vol 2229. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45600-7_4
Download citation
DOI: https://doi.org/10.1007/3-540-45600-7_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42880-0
Online ISBN: 978-3-540-45600-1
eBook Packages: Springer Book Archive