Bootstrapped Oblivious Transfer and Secure Two-Party Function Computation

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

5 pages, 2 figures. Submitted to 2009 IEEE International Symposium on Information Theory, Seoul, South Korea

Scientific paper

We propose an information theoretic framework for the secure two-party function computation (SFC) problem and introduce the notion of SFC capacity. We study and extend string oblivious transfer (OT) to sample-wise OT. We propose an efficient, perfectly private OT protocol utilizing the binary erasure channel or source. We also propose the bootstrap string OT protocol which provides disjoint (weakened) privacy while achieving a multiplicative increase in rate, thus trading off security for rate. Finally, leveraging our OT protocol, we construct a protocol for SFC and establish a general lower bound on SFC capacity of the binary erasure channel and source.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Bootstrapped Oblivious Transfer and Secure Two-Party Function Computation does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Bootstrapped Oblivious Transfer and Secure Two-Party Function Computation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Bootstrapped Oblivious Transfer and Secure Two-Party Function Computation will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-25374

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.