Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography

Authentication is the first defence line to prevent malicious entities to access smart mobile devices (or SMD). Essentially, there exist many available cryptographic primitives to design authentication protocols. Oblivious transfer (OT) protocol is one of the important cryptographic primitives to de...

Full description

Bibliographic Details
Main Authors: Zengpeng Li, Can Xiang, Chengyu Wang
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2018/5973285
id doaj-38fe6e9f0b394b17bbf7230d6f1275f7
record_format Article
spelling doaj-38fe6e9f0b394b17bbf7230d6f1275f72020-11-25T01:57:03ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/59732855973285Oblivious Transfer via Lossy Encryption from Lattice-Based CryptographyZengpeng Li0Can Xiang1Chengyu Wang2College of Computer Science and Technology, Qingdao University, Qingdao 266071, ChinaCollege of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, ChinaSchool of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing 100871, ChinaAuthentication is the first defence line to prevent malicious entities to access smart mobile devices (or SMD). Essentially, there exist many available cryptographic primitives to design authentication protocols. Oblivious transfer (OT) protocol is one of the important cryptographic primitives to design authentication protocols. The first lattice-based OT framework under universal composability (UC) model was designed by dual mode encryption and promoted us to find an alternative efficient scheme. We note that “lossy encryption” scheme is an extension of the dual mode encryption and can be used to design UC-secure OT protocol, but the investigations of OT via lossy encryption over the lattice are absent. Hence, in order to obtain an efficient authentication protocol by improving the performance of the UC-secure OT protocol, in this paper, we first design a multibit lossy encryption under the decisional learning with errors (LWE) assumption and then design a new variant of UC-secure OT protocol for authenticated protocol via lossy encryption scheme. Additionally, our OT protocol is secure against semihonest (static) adversaries in the common reference string (CRS) model and within the UC framework.http://dx.doi.org/10.1155/2018/5973285
collection DOAJ
language English
format Article
sources DOAJ
author Zengpeng Li
Can Xiang
Chengyu Wang
spellingShingle Zengpeng Li
Can Xiang
Chengyu Wang
Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography
Wireless Communications and Mobile Computing
author_facet Zengpeng Li
Can Xiang
Chengyu Wang
author_sort Zengpeng Li
title Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography
title_short Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography
title_full Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography
title_fullStr Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography
title_full_unstemmed Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography
title_sort oblivious transfer via lossy encryption from lattice-based cryptography
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2018-01-01
description Authentication is the first defence line to prevent malicious entities to access smart mobile devices (or SMD). Essentially, there exist many available cryptographic primitives to design authentication protocols. Oblivious transfer (OT) protocol is one of the important cryptographic primitives to design authentication protocols. The first lattice-based OT framework under universal composability (UC) model was designed by dual mode encryption and promoted us to find an alternative efficient scheme. We note that “lossy encryption” scheme is an extension of the dual mode encryption and can be used to design UC-secure OT protocol, but the investigations of OT via lossy encryption over the lattice are absent. Hence, in order to obtain an efficient authentication protocol by improving the performance of the UC-secure OT protocol, in this paper, we first design a multibit lossy encryption under the decisional learning with errors (LWE) assumption and then design a new variant of UC-secure OT protocol for authenticated protocol via lossy encryption scheme. Additionally, our OT protocol is secure against semihonest (static) adversaries in the common reference string (CRS) model and within the UC framework.
url http://dx.doi.org/10.1155/2018/5973285
work_keys_str_mv AT zengpengli oblivioustransfervialossyencryptionfromlatticebasedcryptography
AT canxiang oblivioustransfervialossyencryptionfromlatticebasedcryptography
AT chengyuwang oblivioustransfervialossyencryptionfromlatticebasedcryptography
_version_ 1724976714634756096