Fast Actively Secure OT Extension for Short Secrets

11/20/2019
by   Arpita Patra, et al.
0

Oblivious Transfer (OT) is one of the most fundamental cryptographic primitives with wide-spread application in general secure multi-party computation (MPC) as well as in a number of tailored and special-purpose problems of interest such as private set intersection (PSI), private information retrieval (PIR), contract signing to name a few. Often the instantiations of OT require prohibitive communication and computation complexity. OT extension protocols are introduced to compute a very large number of OTs referred to as extended OTs at the cost of a small number of OTs referred to as seed OTs. We present a fast OT extension protocol for small secrets in the active setting. Our protocol when used to produce 1-out-of-n OTs outperforms all the known actively secure OT extensions. Our protocol is built on the semi-honest secure extension protocol of Kolesnikov and Kumaresan of CRYPTO'13 (referred to as KK13 protocol henceforth) which is the best known OT extension for short secrets.

READ FULL TEXT
research
01/28/2022

Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees

Secure multi-party computation (MPC) is a fundamental problem in secure ...
research
09/14/2023

Secure and Scalable Circuit-based Protocol for Multi-Party Private Set Intersection

We propose a novel protocol for computing a circuit which implements the...
research
07/08/2019

Towards High-Throughput Secure MPC over the Internet: Communication-Efficient Two-Party Protocols and Its Application

Secure multi-party computation (MPC) allows a set of parties to compute ...
research
09/28/2022

Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection

In a Private section intersection (PSI) protocol, Alice and Bob compute ...
research
11/17/2017

WYS*: A Verified Language Extension for Secure Multi-party Computations

Secure multi-party computation (MPC) enables a set of mutually distrusti...
research
10/31/2020

A Secure Two-Party Computation Protocol for Intersection Detection between Two Convex Hulls

Intersection detection between three-dimensional bodies has various appl...
research
07/13/2016

Private Multi-party Matrix Multiplication and Trust Computations

This paper deals with distributed matrix multiplication. Each player own...

Please sign up or login with your details

Forgot password? Click here to reset