posted on 2023-11-29, 18:12authored byNico DöttlingNico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs
We show a new general approach for constructing maliciously-secure two-round oblivious
transfer (OT). Specifically, we provide a generic sequence of transformations to upgrade a very
basic notion of two-round OT, which we call elementary OT, to UC-secure OT. We then give
simple constructions of elementary OT under the Computational Diffie-Hellman (CDH) assumption or the Learning Parity with Noise (LPN) assumption, yielding the first constructions of
malicious (UC-secure) two-round OT under these assumptions. Since two-round OT is complete
for two-round 2-party and multi-party computation in the malicious setting, we also achieve the
first constructions of the latter under these assumptions.
History
Preferred Citation
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny and Daniel Wichs. Two-Round Oblivious Transfer from CDH or LPN. In: International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT). 2020.
Primary Research Area
Algorithmic Foundations and Cryptography
Name of Conference
International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT)
Legacy Posted Date
2020-03-31
Open Access Type
Unknown
BibTeX
@inproceedings{cispa_all_3056,
title = "Two-Round Oblivious Transfer from CDH or LPN",
author = "Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel and Wichs, Daniel",
booktitle="{International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT)}",
year="2020",
}