Paper 2024/1006

Delegated-Query Oblivious Transfer and its Practical Applications

Yvo Desmedt, The University of Texas at Dallas
Aydin Abadi, Newcastle University
Abstract

Databases play a pivotal role in the contemporary World Wide Web and the world of cloud computing. Unfortunately, numerous privacy violations have recently garnered attention in the news. To enhance database privacy, we consider Oblivious Transfer (OT), an elegant cryptographic technology. Our observation reveals that existing research in this domain primarily concentrates on theoretical cryptographic applications, overlooking various practical aspects: - OTs assume parties have direct access to databases. Our "1-out-of-2 Delegated-Query OT" enables parties to privately query a database, without direct access. - With the rise of cloud computing, physically separated databases may no longer remain so. Our "1-out-of-2 Delegated-Query Multi-Receiver OT" protects privacy in such evolving scenarios. - Research often ignores the limitations of thin clients, e.g., Internet of Things devices. To address this, we propose a compiler that transforms any 1-out-of-n OT into a thin client version.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
Oblivious TransferDatabasePrivacy
Contact author(s)
y desmedt @ cs ucl ac uk
aydin abadi @ newcastle ac uk
History
2024-06-24: approved
2024-06-21: received
See all versions
Short URL
https://ia.cr/2024/1006
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1006,
      author = {Yvo Desmedt and Aydin Abadi},
      title = {Delegated-Query Oblivious Transfer and its Practical Applications},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1006},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1006}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.