We present an information-theoretic transformation from any 2-round OT protocol with only game-based security in the presence of malicious adversaries into a 4-round (which is known to be optimal) OT protocol with simulation-based security in the presence of malicious adversaries. Our transform is the first satisfying all of the following properties at the same time: - It is in the plain model, without requiring any setup assumption. - It only makes black-box usage of the underlying OT protocol. - It is information-theoretic, as it does not require any further cryptographic assumption (besides the existence of the underlying OT protocol). Additionally, our transform yields a cubic improvement in communication complexity over the best previously known transformation.
@InProceedings{madathil_et_al:LIPIcs.ITC.2022.5, author = {Madathil, Varun and Orsini, Chris and Scafuro, Alessandra and Venturi, Daniele}, title = {{From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-Theoretic}}, booktitle = {3rd Conference on Information-Theoretic Cryptography (ITC 2022)}, pages = {5:1--5:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-238-9}, ISSN = {1868-8969}, year = {2022}, volume = {230}, editor = {Dachman-Soled, Dana}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2022.5}, URN = {urn:nbn:de:0030-drops-164836}, doi = {10.4230/LIPIcs.ITC.2022.5}, annote = {Keywords: Oblivious Transfer, Black-Box compiler, Malicious Security, Plain Model} }
Feedback for Dagstuhl Publishing