Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE

被引:2
|
作者
Ding, Hangchao [1 ]
Jiang, Han [2 ,3 ]
Xu, Qiuliang [2 ,3 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[2] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[3] Key Lab Shandong Prov Software Engn, Jinan 250101, Peoples R China
基金
中国国家自然科学基金;
关键词
SECURE 2-PARTY COMPUTATION; EFFICIENT;
D O I
10.1155/2021/9974604
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose postquantum universal composable (UC) cut-and-choose oblivious transfer (CCOT) protocol under the malicious adversary model. In secure two-party computation, we construct s copies' garbled circuits, including half check circuit and half evaluation circuit. The sender can transfer the key to the receiver by CCOT protocol. Compared to PVW-OT [6] framework, we invoke WQ-OT [35] framework with reusability of common random string (crs) and better security. Relying on LWE's assumption and the property of the Rounding function, we construct an UC-CCOT protocol, which can resist quantum attack in secure two-party computation.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol
    Tang, Yongli
    Guo, Menghao
    Huo, Yachao
    Zhao, Zongqu
    Yu, Jinxia
    Qin, Baodong
    ENTROPY, 2024, 26 (09)
  • [2] A Novel Bilateral Oblivious Transfer Protocol Based on Cut-and-Choose Technique
    Ning, Lulu
    Wang, Jian
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 49 - 56
  • [3] Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption
    Jiang H.
    Xu Q.
    Liu C.
    Zheng Z.
    Tang Y.
    Wang M.
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (02) : 1327 - 1337
  • [4] On Cut-and-Choose Oblivious Transfer and Its Variants
    Kolesnikov, Vladimir
    Kumaresan, Ranjit
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 386 - 412
  • [5] Permutable Cut-and-Choose Oblivious Transfer and Its Application
    Wei, Xiaochao
    Xu, Lin
    Wang, Hao
    Zheng, Zhihua
    IEEE ACCESS, 2020, 8 : 17378 - 17389
  • [6] Several Oblivious Transfer Variants in Cut-and-Choose Scenario
    Zhao, Chuan
    Jiang, Han
    Xu, Qiuliang
    Wei, Xiaochao
    Wang, Hao
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2015, 9 (02) : 1 - 12
  • [7] Cut-and-Choose Bilateral Oblivious Transfer and Its Application
    Zhao, Chuan
    Jiang, Han
    Wei, Xiaochao
    Xu, Qiuliang
    Zhao, Minghao
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 384 - 391
  • [8] Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer
    Wei, Xiaochao
    Xu, Lin
    Zhao, Minghao
    Wang, Hao
    INFORMATION SCIENCES, 2020, 529 : 132 - 140
  • [9] Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries
    Wei, Xiaochao
    Jiang, Han
    Zhao, Chuan
    Zhao, Minghao
    Xu, Qiuliang
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 418 - 425
  • [10] Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
    Lindell, Yehuda
    Pinkas, Benny
    JOURNAL OF CRYPTOLOGY, 2012, 25 (04) : 680 - 722