Security analysis of three oblivious transfer protocols
Publication Type
Book Chapter
Publication Date
2004
Abstract
An m out of n oblivious transfer (OT) protocol is a cryptographic protocol for a sender to transfer m out of n messages to a receiver such that the sender has no idea which m messages are obtained by the receiver (receiver security) and at the same time the receiver cannot obtain more than m messages (sender security). Three such protocols are proposed in [1], which have the advantage that the communication overhead of the protocols is much smaller than that of mimplementations of a 1 out of n OT protocol. In this paper we give a security analysis of the three protocols. First we show that the first protocol cannot guarantee both the sender security and the receiver security simultaneously. Next, we point out an obvious security flaw in the second protocol which allows the receiver to obtain all the n messages. The third protocol is nicely designed to be non-interactive. However, we show that the security of the protocol is based on a sort of parallel discrete logarithm problem, instead of the discrete logarithm problem as claimed in the paper. Using the technique of “generalized birthday attack”, the former problem can be solved with a computation complexity much smaller than that required to solve the discrete logarithm problem.
Keywords
Security Analysis, Advance Encryption Standard, Discrete Logarithm Problem, Oblivious Transfer, Encrypt Message
Discipline
Information Security
Research Areas
Cybersecurity
Publication
Coding, Cryptography and Combinatorics
Editor
Keqin Feng, Harald Niederreiter, and Chaoping Xing
First Page
387
Last Page
396
ISBN
9783764324292
Identifier
10.1007/978-3-0348-7865-4_27
Publisher
Birkhauser Verlag
City or Country
Boston
Citation
YAO, Gang; BAO, Feng; and DENG, Robert H..
Security analysis of three oblivious transfer protocols. (2004). Coding, Cryptography and Combinatorics. 387-396.
Available at: https://ink.library.smu.edu.sg/sis_research/832
Additional URL
https://doi.org/10.1007/978-3-0348-7865-4_27