메뉴 건너뛰기




Volumn 6223 LNCS, Issue , 2010, Pages 707-723

On the efficiency of classical and quantum oblivious transfer reductions

Author keywords

Lower Bounds; Oblivious Transfer; Quantum Cryptography; Two Party Computation; Unconditional Security

Indexed keywords

BLACK BOXES; DERIVE BOUNDS; FINITE FUNCTIONS; FINITE NUMBER; KNOW-HOW; LOWER BOUNDS; NOISY CHANNEL; OBLIVIOUS TRANSFER; PROBABILITY OF ERRORS; QUANTUM PROTOCOLS; QUANTUM SETTING; RABIN OT; SECURE MULTI-PARTY COMPUTATION; SECURE PROTOCOLS; TWO-PARTY COMPUTATION; UNCONDITIONAL SECURITY;

EID: 77956992510     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14623-7_38     Document Type: Conference Paper
Times cited : (30)

References (49)
  • 3
    • 84928743703 scopus 로고
    • Precomputing oblivious transfer
    • Coppersmith, D. (ed.) LNCS Springer, Heidelberg
    • Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
    • (1995) CRYPTO 1995 , vol.963 , pp. 97-109
    • Beaver, D.1
  • 4
    • 35048856983 scopus 로고    scopus 로고
    • A quantitative approach to reductions in secure computation
    • Naor, M. (ed.) LNCS Springer, Heidelberg
    • Beimel, A., Malkin, T.: A quantitative approach to reductions in secure computation. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 238-257. Springer, Heidelberg (2004)
    • (2004) TCC 2004 , vol.2951 , pp. 238-257
    • Beimel, A.1    Malkin, T.2
  • 6
    • 84969361843 scopus 로고
    • Practical quantum oblivious transfer
    • Feigenbaum, J. (ed.) LNCS Springer, Heidelberg
    • Bennett, C.H., Brassard, G., Crépeau, C., Skubiszewska, M.H.: Practical quantum oblivious transfer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 351-366. Springer, Heidelberg (1992)
    • (1992) CRYPTO 1991 , vol.576 , pp. 351-366
    • Bennett, C.H.1    Brassard, G.2    Crépeau, C.3    Skubiszewska, M.H.4
  • 8
    • 21144437147 scopus 로고    scopus 로고
    • Oblivious transfers and privacy amplification
    • Brassard, G., Crépeau, C., Wolf, S.: Oblivious transfers and privacy amplification. Journal of Cryptology 16(4), 219-237 (2003)
    • (2003) Journal of Cryptology , vol.16 , Issue.4 , pp. 219-237
    • Brassard, G.1    Crépeau, C.2    Wolf, S.3
  • 10
    • 84957712978 scopus 로고    scopus 로고
    • On the foundations of oblivious transfer
    • Nyberg, K. (ed.) LNCS Springer, Heidelberg
    • Cachin, C.: On the foundations of oblivious transfer. In: Nyberg, K. (ed.) EURO-CRYPT 1998. LNCS, vol. 1403, pp. 361-374. Springer, Heidelberg (1998)
    • (1998) EURO-CRYPT 1998 , vol.1403 , pp. 361-374
    • Cachin, C.1
  • 11
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS 2001, pp. 136-145 (2001)
    • (2001) FOCS 2001 , pp. 136-145
    • Canetti, R.1
  • 13
    • 85030121757 scopus 로고
    • Equivalence between two flavours of oblivious transfers
    • Pomerance, C. (ed.) LNCS Springer, Heidelberg
    • Crépeau, C.: Equivalence between two flavours of oblivious transfers. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 350-354. Springer, Heidelberg (1988)
    • (1988) CRYPTO 1987 , vol.293 , pp. 350-354
    • Crépeau, C.1
  • 14
    • 23944515855 scopus 로고    scopus 로고
    • Efficient unconditional oblivious transfer from almost any noisy channel
    • Blundo, C., Cimato, S. (eds.) LNCS Springer, Heidelberg
    • Crépeau, C., Morozov, K., Wolf, S.: Efficient unconditional oblivious transfer from almost any noisy channel. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 47-59. Springer, Heidelberg (2005)
    • (2005) SCN 2004 , vol.3352 , pp. 47-59
    • Crépeau, C.1    Morozov, K.2    Wolf, S.3
  • 15
    • 84969350571 scopus 로고
    • On the reversibility of oblivious transfer
    • Davies, D.W. (ed.) LNCS Springer, Heidelberg
    • Crépeau, C., Santha, M.: On the reversibility of oblivious transfer. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 106-113. Springer, Heidelberg (1991)
    • (1991) EUROCRYPT 1991 , vol.547 , pp. 106-113
    • Crépeau, C.1    Santha, M.2
  • 16
    • 33746042169 scopus 로고    scopus 로고
    • Optimal reductions between oblivious transfers using interactive hashing
    • Vaudenay, S. (ed.) LNCS Springer, Heidelberg
    • Crépeau, C., Savvides, G.: Optimal reductions between oblivious transfers using interactive hashing. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 201-221. Springer, Heidelberg (2006)
    • (2006) EUROCRYPT 2006 , vol.4004 , pp. 201-221
    • Crépeau, C.1    Savvides, G.2
  • 17
    • 70350347114 scopus 로고    scopus 로고
    • Improving the security of quantum protocols via commit-and-open
    • Halevi, S. (ed.) LNCS Springer, Heidelberg
    • Damgård, I., Fehr, S., Lunemann, C., Salvail, L., Schaffner, C.: Improving the security of quantum protocols via commit-and-open. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 408-427. Springer, Heidelberg (2009)
    • (2009) CRYPTO 2009 , vol.5677 , pp. 408-427
    • Damgård, I.1    Fehr, S.2    Lunemann, C.3    Salvail, L.4    Schaffner, C.5
  • 18
    • 26444482584 scopus 로고    scopus 로고
    • Unfair noisy channels and oblivious transfer
    • Naor, M. (ed.) LNCS Springer, Heidelberg
    • Damgård, I., Fehr, S., Morozov, K., Salvail, L.: Unfair noisy channels and oblivious transfer. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 355-373. Springer, Heidelberg (2004)
    • (2004) TCC 2004 , vol.2951 , pp. 355-373
    • Damgård, I.1    Fehr, S.2    Morozov, K.3    Salvail, L.4
  • 19
    • 33749565228 scopus 로고    scopus 로고
    • Oblivious transfer and linear functions
    • Dwork, C. (ed.) LNCS Springer, Heidelberg
    • Damgård, I., Fehr, S., Salvail, L., Schaffner, C.: Oblivious transfer and linear functions. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 427-444. Springer, Heidelberg (2006)
    • (2006) CRYPTO 2006 , vol.4117 , pp. 427-444
    • Damgård, I.1    Fehr, S.2    Salvail, L.3    Schaffner, C.4
  • 20
    • 84957697395 scopus 로고    scopus 로고
    • On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
    • Stern, J. (ed.) LNCS Springer, Heidelberg
    • Damgård, I., Kilian, J., Salvail, L.: On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In: Stern, J. (ed.) EU-ROCRYPT 1999. LNCS, vol. 1592, pp. 56-73. Springer, Heidelberg (1999)
    • (1999) EU-ROCRYPT 1999 , vol.1592 , pp. 56-73
    • Damgård, I.1    Kilian, J.2    Salvail, L.3
  • 21
    • 84957611040 scopus 로고    scopus 로고
    • Lower bounds for oblivious transfer reductions
    • Stern, J. (ed.) LNCS Springer, Heidelberg
    • Dodis, Y., Micali, S.: Lower bounds for oblivious transfer reductions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 42-55. Springer, Heidelberg (1999)
    • (1999) EUROCRYPT 1999 , vol.1592 , pp. 42-55
    • Dodis, Y.1    Micali, S.2
  • 23
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
    • (1985) Commun. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 24
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of cryptography
    • Cambridge University Press, Cambridge
    • Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. II. Cambridge University Press, Cambridge (2004)
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 25
    • 85032194875 scopus 로고
    • How to solve any protocol problem - An efficiency improvement
    • Pomerance, C. (ed.) LNCS Springer, Heidelberg
    • Goldreich, O., Vainish, R.: How to solve any protocol problem - an efficiency improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 73-86. Springer, Heidelberg (1988)
    • (1988) CRYPTO 1987 , vol.293 , pp. 73-86
    • Goldreich, O.1    Vainish, R.2
  • 26
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • Boneh, D. (ed.) LNCS Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) CRYPTO 2003 , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 28
    • 45249091424 scopus 로고    scopus 로고
    • A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions
    • Kurosawa, K., Kishimoto, W., Koshiba, T.: A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions. IEEE Transactions on Information Theory 54(6), 2566-2571 (2008)
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.6 , pp. 2566-2571
    • Kurosawa, K.1    Kishimoto, W.2    Koshiba, T.3
  • 29
    • 0001236013 scopus 로고    scopus 로고
    • Insecurity of quantum secure computations
    • Lo, H.K.: Insecurity of quantum secure computations. Physical Review A 56, 1154 (1997)
    • (1997) Physical Review A , vol.56 , pp. 1154
    • Lo, H.K.1
  • 30
    • 0001260566 scopus 로고    scopus 로고
    • Is quantum bit commitment really possible?
    • Lo, H.K., Chau, H.F.: Is quantum bit commitment really possible? Physical Review Letters 78, 3410-3413 (1997)
    • (1997) Physical Review Letters , vol.78 , pp. 3410-3413
    • Lo, H.K.1    Chau, H.F.2
  • 31
    • 84957050617 scopus 로고    scopus 로고
    • Information-theoretic cryptography
    • Wiener, M. (ed.) LNCS Springer, Heidelberg
    • Maurer, U.: Information-theoretic cryptography. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 47-64. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999 , vol.1666 , pp. 47-64
    • Maurer, U.1
  • 32
    • 0001336918 scopus 로고    scopus 로고
    • Unconditionally secure quantum bit commitment is impossible
    • Mayers, D.: Unconditionally secure quantum bit commitment is impossible. Physical Review Letters 78, 3414-3417 (1997)
    • (1997) Physical Review Letters , vol.78 , pp. 3414-3417
    • Mayers, D.1
  • 34
    • 51849126899 scopus 로고    scopus 로고
    • Cryptographic complexity of multi-party computation problems: Classifications and separations
    • Wagner, D. (ed.) LNCS Springer, Heidelberg
    • Prabhakaran, M., Rosulek, M.: Cryptographic complexity of multi-party computation problems: Classifications and separations. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 262-279. Springer, Heidelberg (2008)
    • (2008) CRYPTO 2008 , vol.5157 , pp. 262-279
    • Prabhakaran, M.1    Rosulek, M.2
  • 36
    • 72449167006 scopus 로고    scopus 로고
    • On the power of two-party quantum cryptography
    • Matsui, M. (ed.) LNCS Springer, Heidelberg
    • Salvail, L., Schaffner, C., Sotáková, M.: On the power of Two-party quantum cryptography. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 70-87. Springer, Heidelberg (2009)
    • (2009) ASIACRYPT 2009 , vol.5912 , pp. 70-87
    • Salvail, L.1    Schaffner, C.2    Sotáková, M.3
  • 38
    • 77954644441 scopus 로고    scopus 로고
    • Universally composable quantum multi-party computation
    • Gilbert, H. (ed.) LNCS Springer, Heidelberg
    • Unruh, D.: Universally composable quantum multi-party computation. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 486-505. Springer, Heidelberg (2010)
    • (2010) EUROCRYPT 2010 , vol.6110 , pp. 486-505
    • Unruh, D.1
  • 39
    • 0001998264 scopus 로고
    • Conjugate coding
    • Wiesner, S.: Conjugate coding. SIGACT News 15(1), 78-88 (1983)
    • (1983) SIGACT News , vol.15 , Issue.1 , pp. 78-88
    • Wiesner, S.1
  • 41
    • 23944463739 scopus 로고    scopus 로고
    • Commitment capacity of discrete memoryless channels
    • Winter, A., Nascimento, A.C.A., Imai, H.: Commitment capacity of discrete memoryless channels. In: IMA Int. Conf., pp. 35-51 (2003)
    • (2003) IMA Int. Conf. , pp. 35-51
    • Winter, A.1    Nascimento, A.C.A.2    Imai, H.3
  • 43
    • 45249110618 scopus 로고    scopus 로고
    • New monotones and lower bounds in unconditional two-party computation
    • Wolf, S., Wullschleger, J.: New monotones and lower bounds in unconditional two-party computation. IEEE Transactions on Information Theory 54(6), 2792-2797 (2008)
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.6 , pp. 2792-2797
    • Wolf, S.1    Wullschleger, J.2
  • 44
    • 33745181204 scopus 로고    scopus 로고
    • New monotones and lower bounds in unconditional two-party computation
    • Shoup, V. (ed.) LNCS Springer, Heidelberg
    • Wolf, S., Wullschleger, J.: New monotones and lower bounds in unconditional two-party computation. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 467-477. Springer, Heidelberg (2005)
    • (2005) CRYPTO 2005 , vol.3621 , pp. 467-477
    • Wolf, S.1    Wullschleger, J.2
  • 45
    • 33746074792 scopus 로고    scopus 로고
    • Oblivious transfer is symmetric
    • Vaudenay, S. (ed.) LNCS Springer, Heidelberg
    • Wolf, S., Wullschleger, J.: Oblivious transfer is symmetric. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 222-232. Springer, Heidelberg (2006)
    • (2006) EUROCRYPT 2006 , vol.4004 , pp. 222-232
    • Wolf, S.1    Wullschleger, J.2
  • 46
    • 38049160265 scopus 로고    scopus 로고
    • Oblivious-transfer amplification
    • Naor, M. (ed.) LNCS Springer, Heidelberg
    • Wullschleger, J.: Oblivious-transfer amplification. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 555-572. Springer, Heidelberg (2007)
    • (2007) EUROCRYPT 2007 , vol.4515 , pp. 555-572
    • Wullschleger, J.1
  • 47
    • 70350627590 scopus 로고    scopus 로고
    • Oblivious transfer from weak noisy channels
    • Reingold, O. (ed.) LNCS Springer, Heidelberg
    • Wullschleger, J.: Oblivious transfer from weak noisy channels. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 332-349. Springer, Heidelberg (2009)
    • (2009) TCC 2009 , vol.5444 , pp. 332-349
    • Wullschleger, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.