Research Article

An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications

Table 2

Efficiency comparison.

ProtocolRoundCommunicationAsymmetric computationSecurity model

[4]2Semihonest and malicious
[5]2Semihonest
[16]2Semihonest and one-sided malicious
[30]2Semihonest
[31]3Malicious
Oursā€“ā€“Semihonest

Note: the efficiency of sender in OT is presented here, who inputs pairs of -bit length messages in protocol. Specially, is security parameter, denotes a group, and in 1-out-of- OT.