CISPA
Browse
cispa_all_3056.pdf (496.74 kB)

Two-Round Oblivious Transfer from CDH or LPN

Download (496.74 kB)
conference contribution
posted on 2023-11-29, 18:12 authored by Nico DöttlingNico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs
We show a new general approach for constructing maliciously-secure two-round oblivious transfer (OT). Specifically, we provide a generic sequence of transformations to upgrade a very basic notion of two-round OT, which we call elementary OT, to UC-secure OT. We then give simple constructions of elementary OT under the Computational Diffie-Hellman (CDH) assumption or the Learning Parity with Noise (LPN) assumption, yielding the first constructions of malicious (UC-secure) two-round OT under these assumptions. Since two-round OT is complete for two-round 2-party and multi-party computation in the malicious setting, we also achieve the first constructions of the latter under these assumptions.

History

Preferred Citation

Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny and Daniel Wichs. Two-Round Oblivious Transfer from CDH or LPN. In: International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT). 2020.

Primary Research Area

  • Algorithmic Foundations and Cryptography

Name of Conference

International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT)

Legacy Posted Date

2020-03-31

Open Access Type

  • Unknown

BibTeX

@inproceedings{cispa_all_3056, title = "Two-Round Oblivious Transfer from CDH or LPN", author = "Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel and Wichs, Daniel", booktitle="{International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT)}", year="2020", }

Usage metrics

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC