Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE
Keyword(s):
We propose postquantum universal composable (UC) cut-and-choose oblivious transfer (CCOT) protocol under the malicious adversary model. In secure two-party computation, we construct s copies’ garbled circuits, including half check circuit and half evaluation circuit. The sender can transfer the key to the receiver by CCOT protocol. Compared to PVW-OT [6] framework, we invoke WQ-OT [35] framework with reusability of common random string ( crs ) and better security. Relying on LWE’s assumption and the property of the Rounding function, we construct an UC-CCOT protocol, which can resist quantum attack in secure two-party computation.
Keyword(s):
2005 ◽
Vol E88-D
(12)
◽
pp. 2890-2892
◽
2017 ◽
Vol 97
(2)
◽
pp. 3113-3123
◽
2012 ◽
Vol 605-607
◽
pp. 2329-2332
Keyword(s):