@inproceedings{f58fc87283f344d18705cfa569986ec9,
title = "Oblivious Transfer from Trapdoor Permutations in Minimal Rounds",
abstract = "Oblivious transfer (OT) is a foundational primitive within cryptography owing to its connection with secure computation. One of the oldest constructions of oblivious transfer was from certified trapdoor permutations (TDPs). However several decades later, we do not know if a similar construction can be obtained from TDPs in general. In this work, we study the problem of constructing round optimal oblivious transfer from trapdoor permutations. In particular, we obtain the following new results (in the plain model) relying on TDPs in a black-box manner: – Three-round oblivious transfer protocol that guarantees indistinguishability-security against malicious senders (and semi-honest receivers). – Four-round oblivious transfer protocol secure against malicious adversaries with black-box simulation-based security. By combining our second result with an already known compiler we obtain the first round-optimal 2-party computation protocol that relies in a black-box way on TDPs. A key technical tool underlying our results is a new primitive we call dual witness encryption (DWE) that may be of independent interest.",
keywords = "Oblivious transfer, Trapdoor permutations, Two-party computation",
author = "Choudhuri, {Arka Rai} and Michele Ciampi and Vipul Goyal and Abhishek Jain and Rafail Ostrovsky",
note = "Funding Information: Acknowledgments. Arka Rai Choudhuri is supported by NSF CNS-1814919, NSF CAREER 1942789, Johns Hopkins University Catalyst award, NSF CNS-1908181, Office of Naval Research N00014-19-1-2294. Funding Information: Rafail Ostrovsky is supported in part by DARPA under Cooperative Agreement HR0011-20-2-0025, NSF grant CNS-2001096, US-Israel BSF grant 2015782, Google Faculty Award, JP Morgan Faculty Award, IBM Faculty Research Award, Xerox Faculty Research Award, OKAWA Foundation Research Award, B. John Garrick Foundation Award, Teradata Research Award, Lockheed-Martin Research Award and Sunday Group. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of DARPA, the Department of Defense, or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for governmental purposes not withstanding any copyright annotation therein. Funding Information: Vipul Goyal is supported in part by the NSF award 1916939, DARPA SIEVE program, a gift from Ripple, a DoE NETL award, a JP Morgan Faculty Fellowship, a PNC center for financial services innovation award, and a Cylab seed funding award. Funding Information: Abhishek Jain is supported in part by an NSF CNS grant 1814919, NSF CAREER award 1942789, Johns Hopkins University Catalyst award and Office of Naval Research grant N00014-19-1-2294. Publisher Copyright: {\textcopyright} 2021, International Association for Cryptologic Research.; 19th International Conference on Theory of Cryptography, TCC 2021 ; Conference date: 08-11-2021 Through 11-11-2021",
year = "2021",
month = nov,
day = "4",
doi = "10.1007/978-3-030-90453-1_18",
language = "English",
isbn = "978-3-030-90452-4",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "518--549",
editor = "Kobbi Nissim and Brent Waters",
booktitle = "Theory of Cryptography",
address = "United Kingdom",
}