• DocumentCode
    2734848
  • Title

    The relationship between public key encryption and oblivious transfer

  • Author

    Gertner, Yael ; Kannan, Sampath ; Malkin, Tal ; Reingold, Omer ; Viswanathan, Mahesh

  • Author_Institution
    Pennsylvania Univ., Philadelphia, PA, USA
  • fYear
    2000
  • fDate
    2000
  • Firstpage
    325
  • Lastpage
    335
  • Abstract
    In this paper we study the relationships among some of the most fundamental primitives and protocols in cryptography: public-key encryption (i.e. trapdoor predicates), oblivious transfer (which is equivalent to general secure multi-party computation), key agreement and trapdoor permutations. Our main results show that public-key encryption and oblivious transfer are incomparable under black-box reductions. These separations are tightly matched by our positive results where a restricted (strong) version of one primitive does imply the other primitive. We also show separations between oblivious transfer and key agreement. Finally, we conclude that neither oblivious transfer nor trapdoor predicates imply trapdoor permutations. Our techniques for showing negative results follow the oracle separations of R. Impagliazzo and S. Rudich (1989)
  • Keywords
    protocols; public key cryptography; black-box reductions; cryptography; key agreement; oblivious transfer; primitives; protocols; public key encryption; public-key encryption; secure multi-party computation; trapdoor permutations; trapdoor predicates; Complexity theory; Computational Intelligence Society; Cryptographic protocols; Digital signatures; Graphics; Public key; Public key cryptography; Security; Technological innovation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Foundations of Computer Science, 2000. Proceedings. 41st Annual Symposium on
  • Conference_Location
    Redondo Beach, CA
  • ISSN
    0272-5428
  • Print_ISBN
    0-7695-0850-2
  • Type

    conf

  • DOI
    10.1109/SFCS.2000.892121
  • Filename
    892121