The DDH-based instantiation of our first framework costs the minimum communication rounds and the minimum computational overhead, compared with existing practical protocols for oblivious transfer with fully simulatable security against covert adversaries or malicious adversaries.
Though our second framework is not efficient, compared with existing practical protocols with one-sided simulatable security against malicious adversaries. However, it first provides a way to deal with general $OT^{n}_{h}$ on this security level. What is more, its DDH-based instantiation is more efficient than the existing practical protocols for oblivious transfer with fully simulatable security against malicious adversaries.
Category / Keywords: cryptographic protocols / oblivious transfer, secure two-party computation Date: received 31 Dec 2010, last revised 4 Jan 2011 Contact author: zeng bing zb at gmail com Available formats: PDF | BibTeX Citation Version: 20110105:022512 (All versions of this report) Discussion forum: Show discussion | Start new discussion