A Survey of Oblivious Transfer Protocol

通信源 计算机科学 不经意传输 加密 计算机网络 协议(科学) 钥匙(锁) 密码学 集合(抽象数据类型) 扩展(谓词逻辑) 计算机安全 公钥密码术 对称密钥算法 医学 病理 程序设计语言 替代医学
作者
Vijay Kumar Yadav,Nitish Andola,Shekhar Verma,S. Venkatesan
出处
期刊:ACM Computing Surveys [Association for Computing Machinery]
卷期号:54 (10s): 1-37 被引量:2
标识
DOI:10.1145/3503045
摘要

Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide range of applications such as secure multi-party computation, private information retrieval, private set intersection, contract signing, and privacy-preserving location-based services. The OT protocol has different variants such as one-out-of-2, one-out-of- n , k -out-of- n , and OT extension. In the OT (one-out-of-2, one-out-of- n , and OT extension) protocol, the sender has a set of messages, whereas the receiver has a key. The receiver sends that key to the sender in a secure way; the sender cannot get any information about the received key. The sender encrypts every message by operating on every message using the received key and sends all the encrypted messages to the receiver. The receiver is able to extract only the required message using his key. However, in the k -out-of- n OT protocol, the receiver sends a set of k keys to the sender, and in replay, the sender sends all the encrypted messages. The receiver uses his keys and extracts the required messages, but it cannot gain any information about the messages that it has not requested. Generally, the OT protocol requires high communication and computation cost if we transfer millions of oblivious messages. The OT extension protocol provides a solution for this, where the receiver transfers a set of keys to the sender by executing a few numbers of OT protocols. Then, the sender encrypts all the messages using cheap symmetric key cryptography with the help of a received set of keys and transfers millions of oblivious messages to the receiver. In this work, we present different variants of OT protocols such as one-out-of-2, one-out-of- n , k -out-of- n , and OT extension. Furthermore, we cover various aspects of theoretical security guarantees such as semi-honest and malicious adversaries, universally composable, used techniques, computation, and communication efficiency aspects. From the analysis, we found that the semi-honest adversary-based OT protocols required low communication and computation costs as compared to malicious adversary-based OT protocols.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
大幅提高文件上传限制,最高150M (2024-4-1)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
酷波er应助科研通管家采纳,获得10
1秒前
从容芮应助科研通管家采纳,获得30
1秒前
从容芮应助科研通管家采纳,获得30
1秒前
从容芮应助科研通管家采纳,获得30
1秒前
1秒前
喜悦彤应助沐沐1003采纳,获得30
2秒前
3秒前
3秒前
5秒前
6秒前
个性的紫菜应助生动不愁采纳,获得10
6秒前
zzy完成签到 ,获得积分10
7秒前
medocrate完成签到,获得积分10
10秒前
满意荔枝发布了新的文献求助10
11秒前
11秒前
田様应助TH采纳,获得10
12秒前
13秒前
今后应助moyacheung采纳,获得10
18秒前
20秒前
情怀应助张作伟采纳,获得10
20秒前
20秒前
22秒前
君无双完成签到,获得积分10
22秒前
wangjingli666应助Dawn采纳,获得10
23秒前
靓丽行天完成签到,获得积分10
24秒前
皆非发布了新的文献求助10
25秒前
sheila完成签到 ,获得积分10
25秒前
orixero应助美美熊采纳,获得10
25秒前
打我呀发布了新的文献求助10
25秒前
星辰大海应助农大彭于晏采纳,获得10
30秒前
30秒前
30秒前
追寻凌青完成签到,获得积分10
31秒前
32秒前
寻道图强应助Dawn采纳,获得30
32秒前
皆非完成签到 ,获得积分10
34秒前
yy完成签到 ,获得积分10
34秒前
大白不白发布了新的文献求助10
35秒前
39秒前
小蘑菇应助zz采纳,获得10
42秒前
高分求助中
请在求助之前详细阅读求助说明!!!! 20000
One Man Talking: Selected Essays of Shao Xunmei, 1929–1939 1000
The Three Stars Each: The Astrolabes and Related Texts 900
Yuwu Song, Biographical Dictionary of the People's Republic of China 700
[Lambert-Eaton syndrome without calcium channel autoantibodies] 520
Bernd Ziesemer - Maos deutscher Topagent: Wie China die Bundesrepublik eroberte 500
A radiographic standard of reference for the growing knee 400
热门求助领域 (近24小时)
化学 材料科学 医学 生物 有机化学 工程类 生物化学 纳米技术 物理 内科学 计算机科学 化学工程 复合材料 遗传学 基因 物理化学 催化作用 电极 光电子学 量子力学
热门帖子
关注 科研通微信公众号,转发送积分 2471832
求助须知:如何正确求助?哪些是违规求助? 2138211
关于积分的说明 5448863
捐赠科研通 1862106
什么是DOI,文献DOI怎么找? 926057
版权声明 562747
科研通“疑难数据库(出版商)”最低求助积分说明 495326