Nothing Special   »   [go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2019/414

Two-Round Oblivious Transfer from CDH or LPN

Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, and Daniel Wichs

Abstract

We show a new general approach for constructing maliciously secure two-round oblivious transfer (OT). Specifically, we provide a generic sequence of transformations to upgrade a very basic notion of two-round OT, which we call elementary OT, to UC-secure OT. We then give simple constructions of elementary OT under the Computational Diffie-Hellman (CDH) assumption or the Learning Parity with Noise (LPN) assumption, yielding the first constructions of malicious (UC-secure) two-round OT under these assumptions. Since two-round OT is complete for two-round 2-party and multi-party computation in the malicious setting, we also achieve the first constructions of the latter under these assumptions.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
A minor revision of an IACR publication in EUROCRYPT 2020
Keywords
oblivious transfermultiparty computation
Contact author(s)
wichs @ ccs neu edu
History
2020-05-06: last of 3 revisions
2019-04-22: received
See all versions
Short URL
https://ia.cr/2019/414
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/414,
      author = {Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny and Daniel Wichs},
      title = {Two-Round Oblivious Transfer from {CDH} or {LPN}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2019/414},
      year = {2019},
      url = {https://eprint.iacr.org/2019/414}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.