An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol

被引:0
|
作者
Tang, Yongli [1 ]
Guo, Menghao [2 ]
Huo, Yachao [3 ]
Zhao, Zongqu [1 ]
Yu, Jinxia [2 ]
Qin, Baodong [4 ]
机构
[1] Henan Polytech Univ, Sch Software, Jiaozuo 454000, Peoples R China
[2] Henan Polytech Univ, Sch Comp Sci & Technol, Jiaozuo 454003, Peoples R China
[3] Bank Commun Co Ltd, Jiyuan Branch, Jiyuan 459099, Peoples R China
[4] Xian Univ Posts & Telecommun, Shaanxi Key Lab Informat Commun Network & Secur, Xian 710121, Peoples R China
关键词
oblivious transfer; cut and choose; learning with errors; dual-mode encryption; quantum attack; AVERAGE-CASE REDUCTIONS; EFFICIENT;
D O I
10.3390/e26090793
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The existing lattice-based cut-and-choose oblivious transfer protocol is constructed based on the learning-with-errors (LWE) problem, which generally has the problem of inefficiency. An efficient cut-and-choose oblivious transfer protocol is proposed based on the difficult module-learning-with-errors (MLWE) problem. Compression and decompression techniques are introduced in the LWE-based dual-mode encryption system to improve it to an MLWE-based dual-mode encryption framework, which is applied to the protocol as an intermediate scheme. Subsequently, the security and efficiency of the protocol are analysed, and the security of the protocol can be reduced to the shortest independent vector problem (SIVP) on the lattice, which is resistant to quantum attacks. Since the whole protocol relies on the polynomial ring of elements to perform operations, the efficiency of polynomial modulo multiplication can be improved by using fast Fourier transform (FFT). Finally, this paper compares the protocol with an LWE-based protocol in terms of computational and communication complexities. The analysis results show that the protocol reduces the computation and communication overheads by at least a factor of n while maintaining the optimal number of communication rounds under malicious adversary attacks.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Fingerprinting protocol based on distributed providers using oblivious transfer
    Shinmyo, Urara
    Kuribayashi, Minoru
    Morii, Masakatu
    Tanaka, Hatsukazu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (10) : 2597 - 2602
  • [42] Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology
    Tate, Stephen R.
    Vishwanathan, Roopa
    DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 252 - +
  • [43] An efficient quantum oblivious transfer protocol
    Sarkar, Sushmita
    Srivastava, Vikas
    Mohanty, Tapaswini
    Debnath, Sumit Kumar
    Mesnager, Sihem
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 14037 - 14048
  • [44] "The simplest protocol for oblivious transfer" revisited
    Genc, Ziya Alper
    Iovino, Vincenzo
    Rial, Alfredo
    INFORMATION PROCESSING LETTERS, 2020, 161
  • [45] A PROVABLY SECURE OBLIVIOUS TRANSFER PROTOCOL
    BERGER, R
    PERALTA, R
    TEDRICK, T
    LECTURE NOTES IN COMPUTER SCIENCE, 1985, 209 : 379 - 386
  • [46] A Verifiable Distributed Oblivious Transfer Protocol
    Corniaux, Christian L. F.
    Ghodosi, Hossein
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 444 - 450
  • [47] A new secure oblivious transfer protocol
    Kim, SG
    Kang, HJ
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5, 2006, 3984 : 690 - 699
  • [48] Quantum security analysis of a lattice-based oblivious transfer protocol
    Liu, Mo-meng
    Kraemer, Juliane
    Hu, Yu-pu
    Buchmann, Johannes
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (09) : 1348 - 1369
  • [49] A LWE-based oblivious transfer protocol from indistinguishability obfuscation
    Zhang, Shanshan
    International Journal of Network Security, 2020, 22 (05): : 801 - 808
  • [50] Quantum security analysis of a lattice-based oblivious transfer protocol
    Mo-meng Liu
    Juliane Krämer
    Yu-pu Hu
    Johannes Buchmann
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1348 - 1369