We build a two-round, UC-secure oblivious transfer protocol (OT) in the common reference string (CRS) model under the Learning with Errors assumption (LWE) with sub-exponential modulus-to-noise ratio. We do so by instantiating the dual-mode encryption framework of Peikert, Vaikuntanathan and Waters (CRYPTO\u2708). The resulting OT can be instantiated in either one of two modes: one providing statistical sender security, and the other statistical receiver security. Furthermore, our scheme allows the sender and the receiver to reuse the CRS across arbitrarily many executions of the protocol. To the best of our knowledge, this gives the first construction of a UC-secure OT from LWE that achieves both statistical receiver security and unbounded...
Adaptive security embodies one of the strongest notions of security that allows an adversary to corr...
We show how to construct a completely generic UC-secure oblivious transfer scheme from a collision-r...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications,...
Oblivious Transfer (OT) is a simple, yet fundamental primitive which suffices to achieve almost ever...
: We construct a two-message oblivious transfer (OT) protocol without setup that guarantees statisti...
We show a new general approach for constructing maliciously-secure two-round oblivious transfer (OT...
Authentication is the first defence line to prevent malicious entities to access smart mobile device...
Oblivious transfer (OT) is an essential cryptographic tool that can serve as a building block for al...
We construct a protocol for constant round Two-Party Secure Function Evaluation in the standard mode...
We present a general framework for efficient, universally composable oblivious transfer (OT) protoco...
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and multi-part...
Oblivious transfer (OT) is a powerful primitive in modern cryptography, often used in a context of s...
In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure comp...
We show that random oblivious transfer protocols that are statistically secure according to a defini...
Adaptive security embodies one of the strongest notions of security that allows an adversary to corr...
We show how to construct a completely generic UC-secure oblivious transfer scheme from a collision-r...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications,...
Oblivious Transfer (OT) is a simple, yet fundamental primitive which suffices to achieve almost ever...
: We construct a two-message oblivious transfer (OT) protocol without setup that guarantees statisti...
We show a new general approach for constructing maliciously-secure two-round oblivious transfer (OT...
Authentication is the first defence line to prevent malicious entities to access smart mobile device...
Oblivious transfer (OT) is an essential cryptographic tool that can serve as a building block for al...
We construct a protocol for constant round Two-Party Secure Function Evaluation in the standard mode...
We present a general framework for efficient, universally composable oblivious transfer (OT) protoco...
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and multi-part...
Oblivious transfer (OT) is a powerful primitive in modern cryptography, often used in a context of s...
In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure comp...
We show that random oblivious transfer protocols that are statistically secure according to a defini...
Adaptive security embodies one of the strongest notions of security that allows an adversary to corr...
We show how to construct a completely generic UC-secure oblivious transfer scheme from a collision-r...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...