pith. machine review for the scientific record. sign in

arxiv: 0902.0822 · v1 · submitted 2009-02-04 · 💻 cs.CR · cs.IT· math.IT

Recognition: unknown

Bootstrapped Oblivious Transfer and Secure Two-Party Function Computation

Authors on Pith no claims yet
classification 💻 cs.CR cs.ITmath.IT
keywords protocolproposebinarycapacitychannelcomputationerasurefunction
0
0 comments X
read the original abstract

We propose an information theoretic framework for the secure two-party function computation (SFC) problem and introduce the notion of SFC capacity. We study and extend string oblivious transfer (OT) to sample-wise OT. We propose an efficient, perfectly private OT protocol utilizing the binary erasure channel or source. We also propose the bootstrap string OT protocol which provides disjoint (weakened) privacy while achieving a multiplicative increase in rate, thus trading off security for rate. Finally, leveraging our OT protocol, we construct a protocol for SFC and establish a general lower bound on SFC capacity of the binary erasure channel and source.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.