SLIDE 1 ON THE FEASIBILITY OF EXTENDING OBLIVIOUS TRANSFER
Yehuda Lindell Yehuda Lindell Hila Zarosim Hila Zarosim
TCC 2013
SLIDE 2 Obli i T f Oblivious Transfer
The other message message remains secret to the the receiver
SLIDE 3 Obli i T f Oblivious Transfer
- One of the most important primitives in secure
computation
Used in essentially all constructions of secure computation
- Used in essentially all constructions of secure computation
protocols
- Requires strong hardness assumptions
- Enhanced TDP ; homomorphic encryption
- PKE ; OWF
SLIDE 4 Obli i T f Oblivious Transfer
- OT is expensive and a secure protocol usually needs
many executions of oblivious transfer
- In 1996 Beaver asked the following question:
I it ibl t ll b f OT’ d k ti
- Is it possible to use a small number of OT’s and a weak assumption
to obtain many OT’s?
SLIDE 5
OT E i OT-Extensions
SLIDE 6
OT E i OT-Extensions
SLIDE 7 Effi i OT E i Efficient OT-Extension
- The original construction of Beaver is not efficient
- In 2003, an efficient OT-extension protocol was presented
[IKNP03]
- Efficient OT-extension are widely used to speed-up
protocols that use many OTs protocols that use many OTs
SLIDE 8
OT E i B k d OT Extensions - Background
SLIDE 10 A Th i l S d f OT E i A Theoretical Study of OT Extension
- We know that OT extensions exist assuming OWFs
- We know that OT extensions cannot be computed
i f ti th ti ll [B96] information theoretically [B96] WE DON’T KNOW ANYTHING ELSE!
- WE DON’T KNOW ANYTHING ELSE!
Thi i i i h i l f ibili d f OT
- This paper: we initiate a theoretical feasibility study of OT
extensions
- What can and cannot be achieved and under what assumptions?
- What can and cannot be achieved and under what assumptions?
SLIDE 11 O h f ibili f OT i On the feasibility of OT-extension
- We ask the following questions:
What is the minimal assumption required for What is the minimal assumption required for constructing OT-extensions? Is it possible to extend a logarithmic number of
Can oblivious transfer be extended with adaptive Can oblivious transfer be extended with adaptive security?
SLIDE 12 O h f ibili f OT i On the feasibility of OT-extension
- We ask the following questions:
What is the minimal assumption required for What is the minimal assumption required for constructing OT-extensions? Is it possible to extend a logarithmic number of
Can oblivious transfer be extended with adaptive Can oblivious transfer be extended with adaptive security?
SLIDE 13 Mi i l A i Minimal Assumptions
Theorem: The existence of a secure OT-extension implies the existence of one-way functions. y
- Corollary: One-way functions are sufficient and necessary
for (statistically secure) OT-extensions
SLIDE 14
P f Id Proof Idea
SLIDE 15
P f Id Proof Idea
SLIDE 16 O h f ibili f OT i On the feasibility of OT-extension
- We ask the following questions:
What is the minimal assumption required for What is the minimal assumption required for constructing OT-extensions? Is it possible to extend a logarithmic number of
C bli i t f b t d d ith d ti
Can oblivious transfer be extended with adaptive security?
SLIDE 17 O h b f i i i l OT’ On the number of initial OT’s
Secure against malicious malicious adversaries
SLIDE 18
P f Id Proof Idea
SLIDE 19 P f Id Proof Idea
- We obtain OT with weak correctness
- Weak correctness can be amplified by multiple
executions
- Malicious security guarantees that the receiver learns
nothing
Thi i d d b h i “d i ” f h l
- This is needed because the receiver “deviates” from the protocol
- It guesses the output rather than taking the output from the OT
calls
SLIDE 20 O h f ibili f OT i On the feasibility of OT-extension
- We ask the following questions:
What is the minimal assumption required for What is the minimal assumption required for constructing OT-extensions? Is it possible to extend a logarithmic number of
- blivious transfers?
- blivious transfers?
Can oblivious transfer be extended with adaptive security?
SLIDE 21 Ad i S i Adaptive Security
- The adversary chooses who to corrupt and when based
- n its view during the execution
- Corruptions can be made also at the end of the execution
(“post execution phase”) when the transcript is fixed ( post-execution phase ), when the transcript is fixed Once a party is corrupted the adversary receives its input
- Once a party is corrupted, the adversary receives its input
and random tape
SLIDE 22
Th Ch ll i Ad i S i The Challenge in Adaptive Security
SLIDE 23 Th Ch ll i Ad i S i The Challenge in Adaptive Security
- Assume that Alice is corrupted at the outset.
- The simulator has to generate a simulated view for Alice.
SLIDE 24 Th Ch ll i Ad i S i The Challenge in Adaptive Security
- Assume that Alice is corrupted at the outset.
- The simulator has to generate a simulated view for Alice.
A th t B b i t d t th t ti
- Assume that Bob is corrupted at the post execution
phase.
SLIDE 25 Th Ch ll i Ad i S i The Challenge in Adaptive Security
- Assume that Alice is corrupted at the outset.
- The simulator has to generate a simulated view for Alice.
A th t B b i t d t th t ti
- Assume that Bob is corrupted at the post execution
phase.
- The simulator learns the input of Bob and has to generate a view
- The simulator learns the input of Bob and has to generate a view
for Bob that is consistent with the input of Bob and the already fixed view of Alice.
- Hence, the simulated view of Alice should be
such that it can later be “explained” as consistent with any possible input of Bob.
SLIDE 26 E i i h Ad i S i Extensions with Adaptive Security
Theorem: The existence of an adaptively secure OT-extension implies the existence of a statically secure OT protocol. p y p
SLIDE 27
SLIDE 28
P f Id Proof Idea
SLIDE 29
P f Id Proof Idea
SLIDE 30 P f Id Proof Idea
1
SLIDE 31 P f Id Proof Idea
SLIDE 32 P f Id Proof Idea
SLIDE 33 P f Id Proof Idea
SLIDE 34 P f Id Proof Idea
SLIDE 35
P f Id Proof Idea
SLIDE 36 Summary
- In this work, we study the feasibility
- f extending OT
- We show that OWF are necessary
for extending OT
- To extend only a logarithmic number of oblivious
transfers, one has to construct an OT protocol from scratch scratch
- Adaptive OT extensions based on a weaker assumption
than static oblivious transfer do not exist than static oblivious transfer do not exist
SLIDE 37
O Q i Open Questions
SLIDE 38