Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone

نویسندگان

چکیده

Oblivious Transfer (OT) is a major primitive for secure multi-party computation. Indeed, combined with symmetric primitives along garbled circuits, it allows any function evaluation between two parties. In this paper, we propose new approach to build OT protocols. Interestingly, our paradigm features security analysis in the Universal Composability (UC) framework and may be instantiated from post-quantum primitives. order do so, define named Smooth Projective Hash Function Grey Zone (SPHFwGZ) which can seen as relaxation of classical Functions, subset words one cannot claim correctness nor smoothness: grey zone. As concrete application, provide instantiations SPHFwGZ respectively based on Diffie-Hellman Learning With Errors (LWE) problems. Hence, quantum-resistant protocol UC-security random oracle model.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generic Construction of UC-Secure Oblivious Transfer

We show how to construct a completely generic UC-secure oblivious transfer scheme from a collision-resistant chameleon hash scheme (CH) and a CCA encryption scheme accepting a smooth projective hash function (SPHF). Our work is based on the work of Abdalla et al. at Asiacrypt 2013, where the authors formalize the notion of SPHF-friendly commitments, i.e. accepting an SPHF on the language of val...

متن کامل

Unconditionally secure quantum oblivious transfer

Based on quantum uncertainty and quantum entanglement, an quantum allor-nothing oblivious transfer protocol is proposed. It is illustrated in detail that the protocol is unconditionally secure. The distinct merit of the present protocol lies in that it is not based on quantum bit commitment. The full utilization of the entanglement makes the protocol different from previous insecure ones, thus ...

متن کامل

Quantum Oblivious Transfer is Secure Against IndividualMeasurements (

In this paper we show that the BBCS-protocol implementing one of the most important cryptographic primitives oblivious transfer, is secure against any individual measurement allowed by quantum mechanics. We analyze the common situation where successive measurements on the same photon could be used to cheat in the protocol. We model this situation by using a single inner-product-preserving opera...

متن کامل

UC Secure Issuer-Free Adaptive Oblivious Transfer with Hidden Access Policy

Privacy is a major concern in designing any cryptographic primitive when frequent transactions are done electronically. During electronic transactions, people reveal their personal data into several servers and believe that this information does not leak too much about them. The adaptive oblivious transfer with hidden access policy (AOT-HAP) takes measure against such privacy issues. The existi...

متن کامل

An Efficient Secure Oblivious Transfer

As traditional oblivious transfer protocols are treated as a cryptographic primitive, they are usually executed without the consideration of possible attacks, e.g., impersonation, replaying, and man-in-the-middle attacks. Therefore, when these protocols are applied in certain applications such as mental poker playing, some necessary mechanism must be executed first to ensure the security of sub...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2023

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-30122-3_4