Title
Founding crytpography on oblivious transfer
Abstract
Suppose your netmail is being erratically censored by Captain Yossarian. Whenever you send a message, he censors each bit of the message with probability 1/2, replacing each censored bit by some reserved character. Well versed in such concepts as redundancy, this is no real problem to you. The question is, can it actually be turned around and used to your advantage? We answer this question strongly in the affirmative. We show that this protocol, more commonly known as oblivious transfer, can be used to simulate a more sophisticated protocol, known as oblivious circuit evaluation([Y]). We also show that with such a communication channel, one can have completely noninteractive zero-knowledge proofs of statements in NP. These results do not use any complexity-theoretic assumptions. We can show that they have applications to a variety of models in which oblivious transfer can be done.
Year
DOI
Venue
1988
10.1145/62212.62215
STOC
Keywords
Field
DocType
oblivious transfer,reserved character,complexity-theoretic assumption,captain yossarian,noninteractive zero-knowledge proof,sophisticated protocol,real problem,communication channel,oblivious circuit evaluation,zero knowledge proof,communication channels
Divide and choose,Computer science,Communication channel,Theoretical computer science,Redundancy (engineering),Mathematical proof,Secure two-party computation,Oblivious transfer
Conference
ISBN
Citations 
PageRank 
0-89791-264-0
480
33.02
References 
Authors
7
1
Search Limit
100480
Name
Order
Citations
PageRank
Joe Kilian170788.92