An oblivious linear function evaluation protocol, or OLE, is a two-party protocol for the function $f(x) = ax + b$, where a sender inputs the field elements $a,b$, and a receiver inputs $x$ and learns $f(x)$. OLE can be used to build secret-shared multiplication, and is an essential component of many secure computation applications including general-purpose multi-party computation, private set intersection and more. In this work, we present several efficient OLE protocols from the ring learning with errors (RLWE) assumption. Technically, we build two new passively secure protocols, which build upon recent advances in homomorphic secret sharing from (R)LWE (Boyle et al., Eurocrypt 2019), with optimizations tailored to the setting of OLE. We...
We extend a commitment scheme based on the learning with errors over rings (RLWE) problem, and prese...
: We construct a two-message oblivious transfer (OT) protocol without setup that guarantees statisti...
In this paper, we survey the status of attacks on the ring and polynomial learning with errors probl...
Oblivious linear evaluation (OLE) is a fundamental building block in multi-party computation protoco...
Oblivious Linear Evaluation (OLE) is the arithmetic analogue of the well-know oblivious transfer pri...
We introduce a new approach to actively secure two-party computation based on so-called oblivious li...
BUG REPORT: In early 2021 we were made aware of a bug in Lemma 9.1 by Carmit Hazay, Muthu Venkitasu...
The Ring Learning with Errors (RLWE) problem has become one of the most widely used cryptographic as...
Oblivious linear evaluation is a generalization of oblivious transfer, whereby two distrustful parti...
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an eval...
Zero-Knowledge proof is a very basic and important primitive, which allows a prover to prove some st...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
We present efficient Zero-Knowledge Proofs of Knowledge (ZKPoK) for linear and multiplicative relati...
Private set intersection is an important area of research and has been the focus of many works over ...
In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version...
We extend a commitment scheme based on the learning with errors over rings (RLWE) problem, and prese...
: We construct a two-message oblivious transfer (OT) protocol without setup that guarantees statisti...
In this paper, we survey the status of attacks on the ring and polynomial learning with errors probl...
Oblivious linear evaluation (OLE) is a fundamental building block in multi-party computation protoco...
Oblivious Linear Evaluation (OLE) is the arithmetic analogue of the well-know oblivious transfer pri...
We introduce a new approach to actively secure two-party computation based on so-called oblivious li...
BUG REPORT: In early 2021 we were made aware of a bug in Lemma 9.1 by Carmit Hazay, Muthu Venkitasu...
The Ring Learning with Errors (RLWE) problem has become one of the most widely used cryptographic as...
Oblivious linear evaluation is a generalization of oblivious transfer, whereby two distrustful parti...
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an eval...
Zero-Knowledge proof is a very basic and important primitive, which allows a prover to prove some st...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
We present efficient Zero-Knowledge Proofs of Knowledge (ZKPoK) for linear and multiplicative relati...
Private set intersection is an important area of research and has been the focus of many works over ...
In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version...
We extend a commitment scheme based on the learning with errors over rings (RLWE) problem, and prese...
: We construct a two-message oblivious transfer (OT) protocol without setup that guarantees statisti...
In this paper, we survey the status of attacks on the ring and polynomial learning with errors probl...