Abstract | ||
---|---|---|
We propose postquantum universal composable (UC) cut-and-choose oblivious transfer (CCOT) protocol under the malicious adversary model. In secure two-party computation, we construct s copies' garbled circuits, including half check circuit and half evaluation circuit. The sender can transfer the key to the receiver by CCOT protocol. Compared to PVW-OT [6] framework, we invoke WQ-OT [35] framework with reusability of common random string (crs) and better security. Relying on LWE's assumption and the property of the Rounding function, we construct an UC-CCOT protocol, which can resist quantum attack in secure two-party computation. |
Year | DOI | Venue |
---|---|---|
2021 | 10.1155/2021/9974604 | SECURITY AND COMMUNICATION NETWORKS |
DocType | Volume | ISSN |
Journal | 2021 | 1939-0114 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hangchao Ding | 1 | 0 | 0.34 |
Han Jiang | 2 | 1 | 2.38 |
Qiuliang Xu | 3 | 157 | 42.71 |