Generalized Oblivious Transfer (GOT)

Subscribers:
351,000
Published on ● Video Link: https://www.youtube.com/watch?v=J53lb9jPaf4



Duration: 41:38
286 views
2


In this paper, we introduce a primitive known as Verifiable Oblivious Transfer. It is similar to oblivious transfer except that the sender is committed to its input. We then generate protocols for Generalized Oblivious Transfer by secret sharing using the Verifiable Oblivious Transfer primitive based on previous work. The protocols are universally composable. The GOT protocol is used to instantiate Batch Single-Choice Cut-And-Choose OT which in conjunction with a modification to the main protocol of [LP11], achieves constant round secure function evaluation based on Yao's Garbled Circuit. In addition, the idea of GOT is used in conjunction with linear secret sharing and commitments to instantiate a primitive known as Multi-Sender K-Out-of-N OT. This primitive is the most important building block of the optimization of the IPS compiler presented in [LOP11]. In contrast to their specific computational assumptions, our protocols only require black-box Verifiable OT. In addition, the GOT protocols can be used to execute Priced Oblivious Transfer.




Other Videos By Microsoft Research


2016-07-27Metric Learning and Manifolds: Preserving the Intrinsic Geometry
2016-07-27Making money with �free� apps
2016-07-27Collecting a Heap of Shapes
2016-07-27Automatically Assessing Personality from Speech
2016-07-27Ten User Experience Best Practices for Windows Phone Application Development
2016-07-27Generalization Bounds and Consistency for Latent-Structural Probit and Ramp Loss
2016-07-27Structured Prediction in NLP: Dual Decomposition and Structured Sparsity
2016-07-27High Availability for Database Systems in Cloud Computing Environments
2016-07-27Batches: Unified and Efficient Access to RPC, WS, and SQL Services
2016-07-27Reliable Multithreading through Schedule Memoization
2016-07-27Generalized Oblivious Transfer (GOT)
2016-07-27From Contextual Search to Automatic Content Generation: Scaling Human Editorial Judgment
2016-07-27Bound Analysis of Imperative Programs with the Size-change Abstraction
2016-07-27A mobile context monitoring platform for dynamic mobile computing environments
2016-07-27Privacy Amplification and Non-Malleable Extractors Via Character Sums
2016-07-27Visualization Clusters: from Tiled Displays to Remote Visualization
2016-07-27The Median Hypothesis
2016-07-27Developing Natural Language-based Software Analyses & Tools to Expedite Software Maintenance
2016-07-27Semi-Supervised Learning for Acoustic and Prosodic Modeling in Speech Recognition
2016-07-27Code Bubbles: Making the Vision Real
2016-07-27A novel framework of effective resource management for multi-hop wireless networks



Tags:
microsoft research