Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting

被引:8
作者
Costa, Bruno [1 ,2 ]
Branco, Pedro [1 ,3 ]
Goulao, Manuel [1 ,3 ]
Lemus, Mariano [1 ]
Mateus, Paulo [1 ,3 ]
机构
[1] Inst Super Tecn, Dept Matemat, Av Rovisco Pais, P-1049001 Lisbon, Portugal
[2] Capgemini Engn, Av D Joao 2,Lote 1-07-2-1,Piso 2, P-1990096 Lisbon, Portugal
[3] IST, Inst TelecomunicacOes, Av Rovisco Pais, P-1049001 Lisbon, Portugal
关键词
oblivious transfer; quantum cryptography; post-quantum cryptography; universal composability; BIT COMMITMENT; CRYPTOGRAPHY;
D O I
10.3390/e23081001
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Secure computation is a powerful cryptographic tool that encompasses the evaluation of any multivariate function with arbitrary inputs from mutually distrusting parties. The oblivious transfer primitive serves is a basic building block for the general task of secure multi-party computation. Therefore, analyzing the security in the universal composability framework becomes mandatory when dealing with multi-party computation protocols composed of oblivious transfer subroutines. Furthermore, since the required number of oblivious transfer instances scales with the size of the circuits, oblivious transfer remains as a bottleneck for large-scale multi-party computation implementations. Techniques that allow one to extend a small number of oblivious transfers into a larger one in an efficient way make use of the oblivious transfer variant called randomized oblivious transfer. In this work, we present randomized versions of two known oblivious transfer protocols, one quantum and another post-quantum with ring learning with an error assumption. We then prove their security in the quantum universal composability framework, in a common reference string model.
引用
收藏
页数:15
相关论文
共 35 条
[1]  
Applebaum B, 2009, LECT NOTES COMPUT SC, V5677, P595, DOI 10.1007/978-3-642-03356-8_35
[2]  
Blum M., 1982, Digest of Papers Spring COMPCON 82. High Technology in the Information Industry, P133, DOI 10.1145/1008908.1008911
[3]  
Branco Pedro, 2019, Cryptography and Coding. 17th IMA International Conference, IMACC 2019. Proceedings. Lecture Notes in Computer Science (LNCS 11929), P78, DOI 10.1007/978-3-030-35199-1_5
[4]  
Branco P., IACR T CRYPTOGRAPHIC
[5]   Quantum cryptography beyond quantum key distribution [J].
Broadbent, Anne ;
Schaffner, Christian .
DESIGNS CODES AND CRYPTOGRAPHY, 2016, 78 (01) :351-382
[6]  
Canetti R., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P19
[7]   Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145
[8]  
Canetti R., 2020, 20201212 CRYPT EPRIN
[9]  
Cramer R, 2000, LECT NOTES COMPUT SC, V1807, P316
[10]  
CREPEAU C, 1988, LECT NOTES COMPUT SC, V293, P350