{"id":344669,"date":"2017-01-01T16:07:56","date_gmt":"2017-01-02T00:07:56","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-research-item&#038;p=344669"},"modified":"2018-10-16T21:52:35","modified_gmt":"2018-10-17T04:52:35","slug":"smooth-projective-hashing-two-message-oblivious-transfer","status":"publish","type":"msr-research-item","link":"https:\/\/www.microsoft.com\/en-us\/research\/publication\/smooth-projective-hashing-two-message-oblivious-transfer\/","title":{"rendered":"Smooth Projective Hashing and Two-Message Oblivious Transfer"},"content":{"rendered":"<p class=\"Para\">We present a general framework for constructing two-message oblivious transfer protocols using a modification of Cramer and Shoup\u2019s notion of smooth projective hashing (Advances in Cryptology\u2014EUROCRYPT\u201902, Lecture Notes in Computer Science, vol.\u00a02332, pp.\u00a045\u201364, Springer, Berlin, <span class=\"CitationRef\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" title=\"View reference\" href=\"http:\/\/link.springer.com\/article\/10.1007\/s00145-010-9092-8#CR6\">2002<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/span>). This framework is an abstraction of the two-message oblivious transfer protocols of Naor and Pinkas (SODA\u201901, pp.\u00a0448\u2013457, ACM, New York, <span class=\"CitationRef\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" title=\"View reference\" href=\"http:\/\/link.springer.com\/article\/10.1007\/s00145-010-9092-8#CR17\">2001<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/span>) and Aiello et al. (Advances in Cryptology\u2014EUROCRYPT\u201901, Lecture Notes in Computer Science, vol.\u00a02045, pp.\u00a0119\u2013135, Springer, Berlin, <span class=\"CitationRef\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" title=\"View reference\" href=\"http:\/\/link.springer.com\/article\/10.1007\/s00145-010-9092-8#CR1\">2001<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/span>), whose security is based on the Decisional Diffie\u2013Hellman Assumption. In particular, we give two new oblivious transfer protocols. The security of one is based on the Quadratic Residuosity Assumption, and the security of the other is based on the <em class=\"EmphasisTypeItalic \">N<\/em>th Residuosity Assumption. Compared to other applications of smooth projective hashing, in our context we must deal also with maliciously chosen parameters, which raises new technical difficulties.<\/p>\n<p class=\"Para\">We also improve on prior constructions of factoring-based smooth universal hashing, in that our constructions <em class=\"EmphasisTypeItalic \">do not require that the underlying RSA modulus is a product of safe primes<\/em>. (This holds for the schemes based on the Quadratic Residuosity Assumption as well as the ones based on the <em class=\"EmphasisTypeItalic \">N<\/em>th Residuosity Assumption.) In fact, we observe that the safe-prime requirement is unnecessary for many prior constructions. In particular, the factoring-based CCA secure encryption schemes due to Cramer\u2013Shoup, Gennaro\u2013Lindell, and Camenisch\u2013Shoup remain secure even if the underlying RSA modulus is not a product of safe primes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We present a general framework for constructing two-message oblivious transfer protocols using a modification of Cramer and Shoup\u2019s notion of smooth projective hashing (Advances in Cryptology\u2014EUROCRYPT\u201902, Lecture Notes in Computer Science, vol.\u00a02332, pp.\u00a045\u201364, Springer, Berlin, 2002). This framework is an abstraction of the two-message oblivious transfer protocols of Naor and Pinkas (SODA\u201901, pp.\u00a0448\u2013457, ACM, New [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":null,"msr_publishername":"","msr_publisher_other":"","msr_booktitle":"","msr_chapter":"","msr_edition":"Journal of Cryptology","msr_editors":"","msr_how_published":"","msr_isbn":"","msr_issue":"","msr_journal":"Journal of Cryptology","msr_number":"","msr_organization":"","msr_pages_string":"158\u2013193","msr_page_range_start":"158","msr_page_range_end":"193","msr_series":"","msr_volume":"25","msr_copyright":"","msr_conference_name":"","msr_doi":"10.1007\/s00145-010-9092-8","msr_arxiv_id":"","msr_s2_paper_id":"","msr_mag_id":"","msr_pubmed_id":"","msr_other_authors":"","msr_other_contributors":"","msr_speaker":"","msr_award":"","msr_affiliation":"","msr_institution":"","msr_host":"","msr_version":"","msr_duration":"","msr_original_fields_of_study":"","msr_release_tracker_id":"","msr_s2_match_type":"","msr_citation_count_updated":"","msr_published_date":"2012-01-01","msr_highlight_text":"","msr_notes":"","msr_longbiography":"","msr_publicationurl":"http:\/\/link.springer.com\/article\/10.1007\/s00145-010-9092-8","msr_external_url":"","msr_secondary_video_url":"","msr_conference_url":"","msr_journal_url":"","msr_s2_pdf_url":"","msr_year":0,"msr_citation_count":0,"msr_influential_citations":0,"msr_reference_count":0,"msr_s2_match_confidence":0,"msr_microsoftintellectualproperty":true,"msr_s2_open_access":false,"msr_s2_author_ids":[],"msr_pub_ids":[],"msr_hide_image_in_river":0,"footnotes":""},"msr-research-highlight":[],"research-area":[13558],"msr-publication-type":[193715],"msr-publisher":[],"msr-focus-area":[],"msr-locale":[268875],"msr-post-option":[],"msr-field-of-study":[],"msr-conference":[],"msr-journal":[],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-344669","msr-research-item","type-msr-research-item","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_publishername":"","msr_edition":"Journal of Cryptology","msr_affiliation":"","msr_published_date":"2012-01-01","msr_host":"","msr_duration":"","msr_version":"","msr_speaker":"","msr_other_contributors":"","msr_booktitle":"","msr_pages_string":"158\u2013193","msr_chapter":"","msr_isbn":"","msr_journal":"Journal of Cryptology","msr_volume":"25","msr_number":"","msr_editors":"","msr_series":"","msr_issue":"","msr_organization":"","msr_how_published":"","msr_notes":"","msr_highlight_text":"","msr_release_tracker_id":"","msr_original_fields_of_study":"","msr_download_urls":"","msr_external_url":"","msr_secondary_video_url":"","msr_longbiography":"","msr_microsoftintellectualproperty":1,"msr_main_download":"","msr_publicationurl":"http:\/\/link.springer.com\/article\/10.1007\/s00145-010-9092-8","msr_doi":"10.1007\/s00145-010-9092-8","msr_publication_uploader":[{"type":"url","title":"http:\/\/link.springer.com\/article\/10.1007\/s00145-010-9092-8","viewUrl":false,"id":false,"label_id":0},{"type":"doi","title":"10.1007\/s00145-010-9092-8","viewUrl":false,"id":false,"label_id":0}],"msr_related_uploader":"","msr_citation_count":0,"msr_citation_count_updated":"","msr_s2_paper_id":"","msr_influential_citations":0,"msr_reference_count":0,"msr_arxiv_id":"","msr_s2_author_ids":[],"msr_s2_open_access":false,"msr_s2_pdf_url":null,"msr_attachments":[{"id":0,"url":"http:\/\/link.springer.com\/article\/10.1007\/s00145-010-9092-8"}],"msr-author-ordering":[{"type":"text","value":"Shai Halevi","user_id":0,"rest_url":false},{"type":"user_nicename","value":"yael","user_id":34951,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=yael"}],"msr_impact_theme":[],"msr_research_lab":[],"msr_event":[],"msr_group":[],"msr_project":[],"publication":[],"video":[],"msr-tool":[],"msr_publication_type":"article","related_content":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/344669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-research-item"}],"version-history":[{"count":2,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/344669\/revisions"}],"predecessor-version":[{"id":539849,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/344669\/revisions\/539849"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=344669"}],"wp:term":[{"taxonomy":"msr-research-highlight","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-highlight?post=344669"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=344669"},{"taxonomy":"msr-publication-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-publication-type?post=344669"},{"taxonomy":"msr-publisher","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-publisher?post=344669"},{"taxonomy":"msr-focus-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-focus-area?post=344669"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=344669"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=344669"},{"taxonomy":"msr-field-of-study","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-field-of-study?post=344669"},{"taxonomy":"msr-conference","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-conference?post=344669"},{"taxonomy":"msr-journal","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-journal?post=344669"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=344669"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=344669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}