In this work, we propose new techniques to achieve efficient non-interactive string OT using tamper-proof hardware tokens. While from one side our tokens need to be stateful, our protocol enjoys several appealing features: 1) it is secure against malicious receivers and the input privacy of honest receivers is guaranteed unconditionally against malicious senders, 2) it is forward secure, 3) it enjoys adaptive input security, therefore tokens can be sent before parties know their private inputs. This gracefully fits a large number of client-server settings (digital TV, e-banking) and thus many practical applications. On the bad side, the output privacy of honest receivers is not satisfied when tokens are reused for more than one execution.
Category / Keywords: OT, Tamper-Proof Hardware Tokens Date: received 5 Oct 2010, last revised 3 Mar 2011 Contact author: scafuro at dia unisa it Available formats: PDF | BibTeX Citation Note: This version includes an updated comparison with related work and points out some output-privacy issues of our construction. Version: 20110303:205928 (All versions of this report) Discussion forum: Show discussion | Start new discussion