scholarly journals Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Hangchao Ding ◽  
Han Jiang ◽  
Qiuliang Xu

We propose postquantum universal composable (UC) cut-and-choose oblivious transfer (CCOT) protocol under the malicious adversary model. In secure two-party computation, we construct s copies’ garbled circuits, including half check circuit and half evaluation circuit. The sender can transfer the key to the receiver by CCOT protocol. Compared to PVW-OT [6] framework, we invoke WQ-OT [35] framework with reusability of common random string ( crs ) and better security. Relying on LWE’s assumption and the property of the Rounding function, we construct an UC-CCOT protocol, which can resist quantum attack in secure two-party computation.

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 164667-164681
Author(s):  
Hao Long ◽  
Shukui Zhang ◽  
Yang Zhang ◽  
Li Zhang ◽  
Jin Wang

Author(s):  
Xiaochao Wei ◽  
Chuan Zhao ◽  
Han Jiang ◽  
Qiuliang Xu ◽  
Hao Wang

Cryptologia ◽  
2014 ◽  
Vol 38 (4) ◽  
pp. 370-376
Author(s):  
Qinglong Wang ◽  
Jintai Ding

2012 ◽  
Vol 605-607 ◽  
pp. 2329-2332
Author(s):  
Li Yu ◽  
Jun Yao Ye

In a 1-out-n oblivious transfer model, the sender sends n messages to the receiver. But the receiver can only get 1 message from the n messages, and the sender does not know which message the receiver has gotten. In this paper, we proposed a multiple-use 1-out-n oblivious transfer protocol based on threshold idea. It is more efficient than Naor-Pinkas protocol[1] and Tzeng protocol[2].


Sign in / Sign up

Export Citation Format

Share Document