An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol

被引:0
|
作者
Tang, Yongli [1 ]
Guo, Menghao [2 ]
Huo, Yachao [3 ]
Zhao, Zongqu [1 ]
Yu, Jinxia [2 ]
Qin, Baodong [4 ]
机构
[1] Henan Polytech Univ, Sch Software, Jiaozuo 454000, Peoples R China
[2] Henan Polytech Univ, Sch Comp Sci & Technol, Jiaozuo 454003, Peoples R China
[3] Bank Commun Co Ltd, Jiyuan Branch, Jiyuan 459099, Peoples R China
[4] Xian Univ Posts & Telecommun, Shaanxi Key Lab Informat Commun Network & Secur, Xian 710121, Peoples R China
关键词
oblivious transfer; cut and choose; learning with errors; dual-mode encryption; quantum attack; AVERAGE-CASE REDUCTIONS; EFFICIENT;
D O I
10.3390/e26090793
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The existing lattice-based cut-and-choose oblivious transfer protocol is constructed based on the learning-with-errors (LWE) problem, which generally has the problem of inefficiency. An efficient cut-and-choose oblivious transfer protocol is proposed based on the difficult module-learning-with-errors (MLWE) problem. Compression and decompression techniques are introduced in the LWE-based dual-mode encryption system to improve it to an MLWE-based dual-mode encryption framework, which is applied to the protocol as an intermediate scheme. Subsequently, the security and efficiency of the protocol are analysed, and the security of the protocol can be reduced to the shortest independent vector problem (SIVP) on the lattice, which is resistant to quantum attacks. Since the whole protocol relies on the polynomial ring of elements to perform operations, the efficiency of polynomial modulo multiplication can be improved by using fast Fourier transform (FFT). Finally, this paper compares the protocol with an LWE-based protocol in terms of computational and communication complexities. The analysis results show that the protocol reduces the computation and communication overheads by at least a factor of n while maintaining the optimal number of communication rounds under malicious adversary attacks.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Cut-and-Choose双向不经意传输
    赵川
    蒋瀚
    魏晓超
    徐秋亮
    软件学报, 2017, 28 (02) : 352 - 360
  • [22] A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose
    Haines, Thomas
    Muller, Johannes
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 293 - 308
  • [23] The Cut-and-Choose Game and its Application to Cryptographic Protocols
    Zhu, Ruiyu
    Huang, Yan
    Katz, Jonathan
    Shelat, Abhi
    PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 1085 - 1100
  • [24] Efficient Three-Party Computation from Cut-and-Choose
    Choi, Seung Geol
    Katz, Jonathan
    Malozemoff, Alex J.
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 513 - 530
  • [25] 1-Out-of-N Oblivious Transfer from MLWE
    Xu, Jingting
    Pan, Yanbin
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2024, PT I, 2025, 14905 : 123 - 143
  • [26] Fast Optimistically Fair Cut-and-Choose 2PC
    Kupcu, Alptekin
    Mohassel, Payman
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 208 - 228
  • [27] 基于Cut-and-Choose技术的安全多方计算
    赵川
    徐俊
    计算机研究与发展, 2022, 59 (08) : 1800 - 1818
  • [28] Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings
    Lindell, Yehuda
    Riva, Ben
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 476 - 494
  • [29] Subliminal channel that defeats the cut-and-choose method and the analysis of its bandwidth
    Zhang, Tong
    Yang, Bo
    Wang, Yumin
    Li, Zhenfu
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2000, 27 (03): : 344 - 347
  • [30] Emas: an efficient MLWE-based authentication scheme for advanced metering infrastructure in smart grid environment
    Chikouche, Noureddine
    Mezrag, Fares
    Hamza, Rafik
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (11) : 3759 - 3775