DocumentCode
2734848
Title
The relationship between public key encryption and oblivious transfer
Author
Gertner, Yael ; Kannan, Sampath ; Malkin, Tal ; Reingold, Omer ; Viswanathan, Mahesh
Author_Institution
Pennsylvania Univ., Philadelphia, PA, USA
fYear
2000
fDate
2000
Firstpage
325
Lastpage
335
Abstract
In this paper we study the relationships among some of the most fundamental primitives and protocols in cryptography: public-key encryption (i.e. trapdoor predicates), oblivious transfer (which is equivalent to general secure multi-party computation), key agreement and trapdoor permutations. Our main results show that public-key encryption and oblivious transfer are incomparable under black-box reductions. These separations are tightly matched by our positive results where a restricted (strong) version of one primitive does imply the other primitive. We also show separations between oblivious transfer and key agreement. Finally, we conclude that neither oblivious transfer nor trapdoor predicates imply trapdoor permutations. Our techniques for showing negative results follow the oracle separations of R. Impagliazzo and S. Rudich (1989)
Keywords
protocols; public key cryptography; black-box reductions; cryptography; key agreement; oblivious transfer; primitives; protocols; public key encryption; public-key encryption; secure multi-party computation; trapdoor permutations; trapdoor predicates; Complexity theory; Computational Intelligence Society; Cryptographic protocols; Digital signatures; Graphics; Public key; Public key cryptography; Security; Technological innovation;
fLanguage
English
Publisher
ieee
Conference_Titel
Foundations of Computer Science, 2000. Proceedings. 41st Annual Symposium on
Conference_Location
Redondo Beach, CA
ISSN
0272-5428
Print_ISBN
0-7695-0850-2
Type
conf
DOI
10.1109/SFCS.2000.892121
Filename
892121
Link To Document