ON THE FEASIBILITY OF EXTENDING OBLIVIOUS TRANSFER Yehuda Lindell - - PowerPoint PPT Presentation

on the feasibility of extending oblivious transfer
SMART_READER_LITE
LIVE PREVIEW

ON THE FEASIBILITY OF EXTENDING OBLIVIOUS TRANSFER Yehuda Lindell - - PowerPoint PPT Presentation

ON THE FEASIBILITY OF EXTENDING OBLIVIOUS TRANSFER Yehuda Lindell Yehuda Lindell Hila Zarosim Hila Zarosim TCC 2013 Obli i Oblivious Transfer T f The other message message remains secret to the the receiver Obli i Oblivious


slide-1
SLIDE 1

ON THE FEASIBILITY OF EXTENDING OBLIVIOUS TRANSFER

Yehuda Lindell Yehuda Lindell Hila Zarosim Hila Zarosim

TCC 2013

slide-2
SLIDE 2

Obli i T f Oblivious Transfer

The other message message remains secret to the the receiver

slide-3
SLIDE 3

Obli i T f Oblivious Transfer

  • One of the most important primitives in secure

computation

Used in essentially all constructions of secure computation

  • Used in essentially all constructions of secure computation

protocols

  • Requires strong hardness assumptions
  • Enhanced TDP ; homomorphic encryption
  • PKE ; OWF
slide-4
SLIDE 4

Obli i T f Oblivious Transfer

  • OT is expensive and a secure protocol usually needs

many executions of oblivious transfer

  • In 1996 Beaver asked the following question:

I it ibl t ll b f OT’ d k ti

  • Is it possible to use a small number of OT’s and a weak assumption

to obtain many OT’s?

slide-5
SLIDE 5

OT E i OT-Extensions

slide-6
SLIDE 6

OT E i OT-Extensions

slide-7
SLIDE 7

Effi i OT E i Efficient OT-Extension

  • The original construction of Beaver is not efficient
  • In 2003, an efficient OT-extension protocol was presented

[IKNP03]

  • Efficient OT-extension are widely used to speed-up

protocols that use many OTs protocols that use many OTs

slide-8
SLIDE 8

OT E i B k d OT Extensions - Background

slide-9
SLIDE 9

YAO

PRG

YAO

slide-10
SLIDE 10

A Th i l S d f OT E i A Theoretical Study of OT Extension

  • We know that OT extensions exist assuming OWFs
  • We know that OT extensions cannot be computed

i f ti th ti ll [B96] information theoretically [B96] WE DON’T KNOW ANYTHING ELSE!

  • WE DON’T KNOW ANYTHING ELSE!

Thi i i i h i l f ibili d f OT

  • This paper: we initiate a theoretical feasibility study of OT

extensions

  • What can and cannot be achieved and under what assumptions?
  • What can and cannot be achieved and under what assumptions?
slide-11
SLIDE 11

O h f ibili f OT i On the feasibility of OT-extension

  • We ask the following questions:

What is the minimal assumption required for What is the minimal assumption required for constructing OT-extensions? Is it possible to extend a logarithmic number of

  • blivious transfers?

Can oblivious transfer be extended with adaptive Can oblivious transfer be extended with adaptive security?

slide-12
SLIDE 12

O h f ibili f OT i On the feasibility of OT-extension

  • We ask the following questions:

What is the minimal assumption required for What is the minimal assumption required for constructing OT-extensions? Is it possible to extend a logarithmic number of

  • blivious transfers?

Can oblivious transfer be extended with adaptive Can oblivious transfer be extended with adaptive security?

slide-13
SLIDE 13

Mi i l A i Minimal Assumptions

Theorem: The existence of a secure OT-extension implies the existence of one-way functions. y

  • Corollary: One-way functions are sufficient and necessary

for (statistically secure) OT-extensions

slide-14
SLIDE 14

P f Id Proof Idea

slide-15
SLIDE 15

P f Id Proof Idea

slide-16
SLIDE 16

O h f ibili f OT i On the feasibility of OT-extension

  • We ask the following questions:

What is the minimal assumption required for What is the minimal assumption required for constructing OT-extensions? Is it possible to extend a logarithmic number of

  • blivious transfers?

C bli i t f b t d d ith d ti

  • blivious transfers?

Can oblivious transfer be extended with adaptive security?

slide-17
SLIDE 17

O h b f i i i l OT’ On the number of initial OT’s

Secure against malicious malicious adversaries

slide-18
SLIDE 18

P f Id Proof Idea

slide-19
SLIDE 19

P f Id Proof Idea

  • We obtain OT with weak correctness
  • Weak correctness can be amplified by multiple

executions

  • Malicious security guarantees that the receiver learns

nothing

Thi i d d b h i “d i ” f h l

  • This is needed because the receiver “deviates” from the protocol
  • It guesses the output rather than taking the output from the OT

calls

slide-20
SLIDE 20

O h f ibili f OT i On the feasibility of OT-extension

  • We ask the following questions:

What is the minimal assumption required for What is the minimal assumption required for constructing OT-extensions? Is it possible to extend a logarithmic number of

  • blivious transfers?
  • blivious transfers?

Can oblivious transfer be extended with adaptive security?

slide-21
SLIDE 21

Ad i S i Adaptive Security

  • The adversary chooses who to corrupt and when based
  • n its view during the execution
  • Corruptions can be made also at the end of the execution

(“post execution phase”) when the transcript is fixed ( post-execution phase ), when the transcript is fixed Once a party is corrupted the adversary receives its input

  • Once a party is corrupted, the adversary receives its input

and random tape

slide-22
SLIDE 22

Th Ch ll i Ad i S i The Challenge in Adaptive Security

slide-23
SLIDE 23

Th Ch ll i Ad i S i The Challenge in Adaptive Security

  • Assume that Alice is corrupted at the outset.
  • The simulator has to generate a simulated view for Alice.
slide-24
SLIDE 24

Th Ch ll i Ad i S i The Challenge in Adaptive Security

  • Assume that Alice is corrupted at the outset.
  • The simulator has to generate a simulated view for Alice.

A th t B b i t d t th t ti

  • Assume that Bob is corrupted at the post execution

phase.

slide-25
SLIDE 25

Th Ch ll i Ad i S i The Challenge in Adaptive Security

  • Assume that Alice is corrupted at the outset.
  • The simulator has to generate a simulated view for Alice.

A th t B b i t d t th t ti

  • Assume that Bob is corrupted at the post execution

phase.

  • The simulator learns the input of Bob and has to generate a view
  • The simulator learns the input of Bob and has to generate a view

for Bob that is consistent with the input of Bob and the already fixed view of Alice.

  • Hence, the simulated view of Alice should be

such that it can later be “explained” as consistent with any possible input of Bob.

slide-26
SLIDE 26

E i i h Ad i S i Extensions with Adaptive Security

Theorem: The existence of an adaptively secure OT-extension implies the existence of a statically secure OT protocol. p y p

slide-27
SLIDE 27
slide-28
SLIDE 28

P f Id Proof Idea

slide-29
SLIDE 29

P f Id Proof Idea

slide-30
SLIDE 30

P f Id Proof Idea

1

slide-31
SLIDE 31

P f Id Proof Idea

  • 1
slide-32
SLIDE 32

P f Id Proof Idea

  • 1
slide-33
SLIDE 33

P f Id Proof Idea

  • 1
slide-34
SLIDE 34

P f Id Proof Idea

  • 1
slide-35
SLIDE 35

P f Id Proof Idea

slide-36
SLIDE 36

Summary

  • In this work, we study the feasibility
  • f extending OT
  • We show that OWF are necessary

for extending OT

  • To extend only a logarithmic number of oblivious

transfers, one has to construct an OT protocol from scratch scratch

  • Adaptive OT extensions based on a weaker assumption

than static oblivious transfer do not exist than static oblivious transfer do not exist

slide-37
SLIDE 37

O Q i Open Questions

slide-38
SLIDE 38