An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol

被引:0
|
作者
Tang, Yongli [1 ]
Guo, Menghao [2 ]
Huo, Yachao [3 ]
Zhao, Zongqu [1 ]
Yu, Jinxia [2 ]
Qin, Baodong [4 ]
机构
[1] Henan Polytech Univ, Sch Software, Jiaozuo 454000, Peoples R China
[2] Henan Polytech Univ, Sch Comp Sci & Technol, Jiaozuo 454003, Peoples R China
[3] Bank Commun Co Ltd, Jiyuan Branch, Jiyuan 459099, Peoples R China
[4] Xian Univ Posts & Telecommun, Shaanxi Key Lab Informat Commun Network & Secur, Xian 710121, Peoples R China
关键词
oblivious transfer; cut and choose; learning with errors; dual-mode encryption; quantum attack; AVERAGE-CASE REDUCTIONS; EFFICIENT;
D O I
10.3390/e26090793
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The existing lattice-based cut-and-choose oblivious transfer protocol is constructed based on the learning-with-errors (LWE) problem, which generally has the problem of inefficiency. An efficient cut-and-choose oblivious transfer protocol is proposed based on the difficult module-learning-with-errors (MLWE) problem. Compression and decompression techniques are introduced in the LWE-based dual-mode encryption system to improve it to an MLWE-based dual-mode encryption framework, which is applied to the protocol as an intermediate scheme. Subsequently, the security and efficiency of the protocol are analysed, and the security of the protocol can be reduced to the shortest independent vector problem (SIVP) on the lattice, which is resistant to quantum attacks. Since the whole protocol relies on the polynomial ring of elements to perform operations, the efficiency of polynomial modulo multiplication can be improved by using fast Fourier transform (FFT). Finally, this paper compares the protocol with an LWE-based protocol in terms of computational and communication complexities. The analysis results show that the protocol reduces the computation and communication overheads by at least a factor of n while maintaining the optimal number of communication rounds under malicious adversary attacks.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
    Huang, Yan
    Katz, Jonathan
    Evans, David
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 18 - 35
  • [32] The Simplest Protocol for Oblivious Transfer
    Chou, Tung
    Orlandi, Claudio
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 40 - 58
  • [33] Lottery Protocol Using Oblivious Transfer Based on ECC
    Liu, Yining
    Liu, Gao
    Chang, Chin-Chen
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02): : 279 - 285
  • [34] Verifiable oblivious transfer protocol
    Lee, NY
    Wang, CC
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (12): : 2890 - 2892
  • [35] Proxy oblivious transfer protocol
    Yao Gang
    Feng Dengguo
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 190 - +
  • [36] Universally composable oblivious transfer protocol based on VSPH
    Li, Feng-Hua
    Feng, Tao
    Ma, Jian-Feng
    Tongxin Xuebao/Journal on Communications, 2007, 28 (07): : 28 - 34
  • [37] A Quantum Oblivious Transfer Protocol
    Parakh, Abhishek
    NATURE OF LIGHT: WHAT ARE PHOTONS? V, 2013, 8832
  • [38] A Survey of Oblivious Transfer Protocol
    Yadav, Vijay Kumar
    Andola, Nitish
    Verma, Shekhar
    Venkatesan, S.
    ACM COMPUTING SURVEYS, 2022, 54 (10S)
  • [39] PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More
    Chairattana-Apirom, Rutchathon
    Hanzlik, Lucjan
    Loss, Julian
    Lysyanskaya, Anna
    Wagner, Benedikt
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT III, 2022, 13509 : 3 - 31
  • [40] An Analysis of Hardware Design of MLWE-Based Public-Key Encryption and Key-Establishment Algorithms
    Nguyen, Tuy Tan
    Nguyen, Tram Thi Bao
    Lee, Hanho
    ELECTRONICS, 2022, 11 (06)