scholarly journals An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications

2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Shengnan Zhao ◽  
Xiangfu Song ◽  
Han Jiang ◽  
Ming Ma ◽  
Zhihua Zheng ◽  
...  

Oblivious transfer (OT) is a cryptographic primitive originally used to transfer a collection of messages from the sender to the receiver in an oblivious manner. OT extension protocol reduces expensive asymmetric operations by running a small number of OT instances first and then cheap symmetric operations. While most earlier works discussed security model or communication and computation complexity of OT in general case, we focus on concrete application scenarios, especially where the sender in the OT protocol is a database with less computation and limited interaction capability. In this paper, we propose a generic outsourced OT extension protocol ( O Tex ) that outsources all the asymmetric operations of the sender to a semihonest server so as to adapt to specific scenarios above. We give O Tex a standard security definition, and the proposed protocol is proven secure in the semihonest model. In O Tex , the sender works on the fly and performs only symmetric operations locally. Whatever the number of rounds OT to be executed and the length of messages in OT to be sent, our protocol realizes optimal complexity. Besides, O Tex can be used to construct high-level protocols, such as private membership test (PMT) and private set intersection (PSI). We believe our O Tex construction may be a building block in other applications as well.

2019 ◽  
Vol 2019 (3) ◽  
pp. 6-25 ◽  
Author(s):  
Adam Groce ◽  
Peter Rindal ◽  
Mike Rosulek

Abstract In this work we demonstrate that allowing differentially private leakage can significantly improve the concrete performance of secure 2-party computation (2PC) protocols. Specifically, we focus on the private set intersection (PSI) protocol of Rindal and Rosulek (CCS 2017), which is the fastest PSI protocol with security against malicious participants. We show that if differentially private leakage is allowed, the cost of the protocol can be reduced by up to 63%, depending on the desired level of differential privacy. On the technical side, we introduce a security model for differentially-private leakage in malicious-secure 2PC. We also introduce two new and improved mechanisms for “differentially private histogram overestimates,” the main technical challenge for differentially-private PSI.


2021 ◽  
pp. 108-116
Author(s):  
Shengnan Zhao ◽  
Ming Ma ◽  
Xiangfu Song ◽  
Han Jiang ◽  
Yunxue Yan ◽  
...  

Author(s):  
Yalian Qian ◽  
Jian Shen ◽  
Pandi Vijayakumar ◽  
Pradip Kumar Sharma

Sign in / Sign up

Export Citation Format

Share Document