Actually, our schemes can be directly used to implement $1$-out-of-$N$ {\em $\ell$-bit string} oblivious transfer with $O(\ell)$ sender-side communication complexity (against semi-honest receivers and malicious senders). Note the sender-side communication complexity is independent of $N$, the constant hidden in the big-$O$ notation is in fact small, and $\ell$ is unrestricted. Moreover, We also show a way to do communication balancing between the sender-side and the receiver-side.
In addition, we show how to handle malicious receivers with small communication overheads, which itself is a non-trivial result.
Category / Keywords: cryptographic protocols / Date: received 10 Feb 2004 Contact author: ycchang at eecs harvard edu Available formats: Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Version: 20040216:095052 (All versions of this report) Discussion forum: Show discussion | Start new discussion