Affiliation:
1. Digital Rights Management Research Center, Beijing Institute of Graphic Communication, Beijing 102600, China
Abstract
In this paper, a universally composable 1-out-of-N oblivious transfer protocol with low communication is built. This protocol obtained full simulation security based on the modulo learning with rounding (Mod-LWR) assumption. It can achieve universally composable security in the random oracle machine (ROM) model by combining random OT based on the key exchange protocol with the authentication encryption algorithm. It can be proven to resist static adversary attacks by simulating all corruption cases. Based on computer simulation and detailed mathematical derivation, this protocol was practicable and had better efficiency and lower communication.
Funder
National Natural Science Foundation of China
Beijing Municipal Education Commission Scientific Research Project
Beijing Municipal Education Commission Scientific Research Project Funding
Beijing Institute of Graphic Communication Doctoral Funding Project
BIGC
Intramural Discipline Construction Project of Beijing Institute of Graphic Communication
Key Educational Reform Project of Beijing Institute of Graphic Communication
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference27 articles.
1. Cheetah: Lean and fast secure two-party deep neural network inference;Huang;Cryptol. ePrint Arch.,2022
2. Yang, J., Wang, T., Li, N., Cheng, X., and Su, S. (2020). Answering Multi-Dimensional Range Queries under Local Differential Privacy. arXiv.
3. Hong, C., Katz, J., Kolesnikov, V., Lu, W.-J., and Wang, X. (2019, January 19–23). Covert Security with Public Verifiability: Faster, Leaner, and Simpler. Proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany.
4. Using color QR codes for QR code secret sharing;Pan;Multimedia Tools Appl.,2022
5. An Efficient Fully Homomorphic Encryption Scheme for Private Information Retrieval in the Cloud;Wang;Int. J. Pattern Recognit. Artif. Intell.,2019