International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement

Authors:
Daniele Friolo
Daniel Masny
Daniele Venturi
Download:
DOI: 10.1007/978-3-030-36030-6_5
Search ePrint
Search Google
Abstract: We show how to construct maliciously secure oblivious transfer (M-OT) from a strengthening of key agreement (KA) which we call strongly uniform KA (SU-KA), where the latter roughly means that the messages sent by one party are computationally close to uniform, even if the other party is malicious. Our transformation is black-box, almost round preserving (adding only a constant overhead of up to two rounds), and achieves standard simulation-based security in the plain model.As we show, 2-round SU-KA can be realized from cryptographic assumptions such as low-noise LPN, high-noise LWE, Subset Sum, DDH, CDH and RSA—all with polynomial hardness—thus yielding a black-box construction of fully-simulatable, round-optimal, M-OT from the same set of assumptions (some of which were not known before).
BibTeX
@article{tcc-2019-29969,
  title={A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement},
  booktitle={Theory of Cryptography},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={11891},
  pages={111-130},
  doi={10.1007/978-3-030-36030-6_5},
  author={Daniele Friolo and Daniel Masny and Daniele Venturi},
  year=2019
}