Efficient Post Quantum Random Oblivious Transfer Based on Lattice

被引:0
作者
Xu, Lidong [1 ]
Wang, Mingqiang [1 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
来源
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I | 2022年 / 13471卷
基金
中国国家自然科学基金;
关键词
Oblivious transfer; LWE problem; Quantum computation; UC-security; ENCRYPTION;
D O I
10.1007/978-3-031-19208-1_40
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The large scale multiparty computation and private set intersection requires a number of oblivious transfer instances as subroutines, but the implementation of oblivious transfer protocols is relatively slow. An feasible way is to use the oblivious transfer variant called random oblivious transfer. In this paper, we propose a 1-out-of-2 random oblivious transfer protocol and extend it to a 1-out-of-k random oblivious transfer protocol based on the LWE assumption, quantum computation and measurement. Then, we analysis the stand-alone security of our 1-out-of-2 random oblivious transfer protocol under various malicious situations and prove its universally composable security in UC framework. As for the security of our 1-out-of-k random oblivious transfer protocol, the similar results can be obtained.
引用
收藏
页码:491 / 499
页数:9
相关论文
共 23 条
[1]  
Agrawal S, 2011, LECT NOTES COMPUT SC, V7073, P21, DOI 10.1007/978-3-642-25385-0_2
[2]  
Aiello B, 2001, LECT NOTES COMPUT SC, V2045, P119
[3]  
Camenisch J, 2007, LECT NOTES COMPUT SC, V4515, P573
[4]   Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145
[5]   On the Possibility of Classical Client Blind Quantum Computing [J].
Cojocaru, Alexandru ;
Colisson, Leo ;
Kashefi, Elham ;
Wallden, Petros .
CRYPTOGRAPHY, 2021, 5 (01) :1-50
[6]   Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting [J].
Costa, Bruno ;
Branco, Pedro ;
Goulao, Manuel ;
Lemus, Mariano ;
Mateus, Paulo .
ENTROPY, 2021, 23 (08)
[7]  
Goldreich O., 2019, P 19 ANN ACM S THEOR, P307, DOI [DOI 10.1145/28395.28420, 10.1145/3335741.3335755.]
[8]  
Green M, 2007, LECT NOTES COMPUT SC, V4833, P265
[9]  
Ishai Y, 2003, LECT NOTES COMPUT SC, V2729, P145
[10]   An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy [J].
Jannati, Hoda ;
Bahrak, Behnam .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) :3113-3123