International audienceOblivious Transfer (OT) is a major primitive for secure multiparty computation. Indeed, combined with symmetric primitives along with garbled circuits, it allows any secure function evaluation between two parties. In this paper, we propose a new approach to build OT protocols. Interestingly, our new paradigm features a security analysis in the Universal Composability (UC) framework and may be instantiated from post-quantum primitives. In order to do so, we define a new primitive named Smooth Projective Hash Function with Grey Zone (SPHFwGZ) which can be seen as a relaxation of the classical Smooth Projective Hash Functions, with a subset of the words for which one cannot claim correctness nor smoothness: the grey zone....
Oblivious transfer (OT) is a fundamental primitive in cryptography. Halevi-Kalai OT (Halevi, S. and ...
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and multi-part...
We prove the security of NMAC, HMAC, AMAC, and the cascade construction with fixed input-length as q...
International audienceOblivious Transfer (OT) is a major primitive for secure multiparty computation...
Oblivious Transfer (OT) is a major primitive for secure multiparty computation. Indeed, combined wit...
Abstract—We present a framework for fully-simulatable h-out-of-n oblivious transfer (OTnh) with secu...
The key exchange protocol of Diffie and Hellman, which can be defined for any group, has the special...
Because of the concise functionality of oblivious transfer (OT) protocols, they have been widely use...
International audienceAn important problem in secure multi-party computation is the design of protoc...
Abstract. We show how to construct a completely generic UC-secure oblivious transfer scheme from a c...
Abstract Secure multiparty computation has the potential to be a disruptive technique in the realm o...
The research covered in this thesis is dedicated to provable post-quantum security of hash functions...
This thesis studies isogeny-based cryptography and its applications to oblivious transfer protocols....
: We construct a two-message oblivious transfer (OT) protocol without setup that guarantees statisti...
Oblivious transfer (OT) is an essential cryptographic tool that can serve as a building block for al...
Oblivious transfer (OT) is a fundamental primitive in cryptography. Halevi-Kalai OT (Halevi, S. and ...
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and multi-part...
We prove the security of NMAC, HMAC, AMAC, and the cascade construction with fixed input-length as q...
International audienceOblivious Transfer (OT) is a major primitive for secure multiparty computation...
Oblivious Transfer (OT) is a major primitive for secure multiparty computation. Indeed, combined wit...
Abstract—We present a framework for fully-simulatable h-out-of-n oblivious transfer (OTnh) with secu...
The key exchange protocol of Diffie and Hellman, which can be defined for any group, has the special...
Because of the concise functionality of oblivious transfer (OT) protocols, they have been widely use...
International audienceAn important problem in secure multi-party computation is the design of protoc...
Abstract. We show how to construct a completely generic UC-secure oblivious transfer scheme from a c...
Abstract Secure multiparty computation has the potential to be a disruptive technique in the realm o...
The research covered in this thesis is dedicated to provable post-quantum security of hash functions...
This thesis studies isogeny-based cryptography and its applications to oblivious transfer protocols....
: We construct a two-message oblivious transfer (OT) protocol without setup that guarantees statisti...
Oblivious transfer (OT) is an essential cryptographic tool that can serve as a building block for al...
Oblivious transfer (OT) is a fundamental primitive in cryptography. Halevi-Kalai OT (Halevi, S. and ...
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and multi-part...
We prove the security of NMAC, HMAC, AMAC, and the cascade construction with fixed input-length as q...