Paper 2025/031

Round-Optimal Compiler for Semi-Honest to Malicious Oblivious Transfer via CIH

Varun Madathil, Yale University
Alessandra Scafuro, North Carolina State University
Tanner Verber, North Carolina State University
Abstract

A central question in the theory of cryptography is whether we can build protocols that achieve stronger security guarantees, e.g., security against malicious adversaries, by combining building blocks that achieve much weaker security guarantees, e.g., security only against semi-honest adversaries; and with the minimal number of rounds. An additional focus is whether these building blocks can be used only as a black-box. Since Oblivious Transfer (OT) is the necessary and sufficient building block to securely realize any two-party (and multi-party) functionality, theoreticians often focus on proving whether maliciously secure OT can be built from a weaker notion of OT. There is a rich body of literature that provides (black-box) compilers that build malicious OT from OTs that achieve weaker security such as semi-malicious OT and defensibly secure OT, within the minimal number of rounds. However, no round-optimal compiler exists that builds malicious OT from the weakest notion of semi-honest OT, in the plain model. Correlation intractable hash (CIH) functions are special hash functions whose properties allow instantiating the celebrated Fiat-Shamir transform, and hence reduce the round complexity of public-coin proof systems. In this work, we devise the first round-optimal compiler from semi-honest OT to malicious OT, by a novel application of CIH for collapsing rounds in the plain model. We provide the following contributions. First, we provide a new CIH-based round-collapsing construction for general cut-and-choose. This gadget can be used generally to prove the correctness of the evaluation of a function. Then, we use our gadget to build the first round-optimal compiler from semi-honest OT to malicious OT. Our compiler uses the semi-honest OT protocol and the other building blocks in a black-box manner. However, for technical reasons, the underlying CIH construction requires the upper bound of the circuit size of the semi-honest OT protocol used. The need for this upper-bound makes our protocol not fully black-box, hence is incomparable with existing, fully black-box, compilers.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Published by the IACR in CIC 2025
Keywords
Oblivous TransferRound-OptimalCompiler
Contact author(s)
varun madathil @ yale edu
ascafur @ ncsu edu
tverber @ ncsu edu
History
2025-01-09: approved
2025-01-08: received
See all versions
Short URL
https://ia.cr/2025/031
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/031,
      author = {Varun Madathil and Alessandra Scafuro and Tanner Verber},
      title = {Round-Optimal Compiler for Semi-Honest  to Malicious Oblivious Transfer via {CIH}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/031},
      year = {2025},
      url = {https://eprint.iacr.org/2025/031}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.