Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography
Authentication is the first defence line to prevent malicious entities to access smart mobile devices (or SMD). Essentially, there exist many available cryptographic primitives to design authentication protocols. Oblivious transfer (OT) protocol is one of the important cryptographic primitives to de...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2018-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2018/5973285 |
id |
doaj-38fe6e9f0b394b17bbf7230d6f1275f7 |
---|---|
record_format |
Article |
spelling |
doaj-38fe6e9f0b394b17bbf7230d6f1275f72020-11-25T01:57:03ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/59732855973285Oblivious Transfer via Lossy Encryption from Lattice-Based CryptographyZengpeng Li0Can Xiang1Chengyu Wang2College of Computer Science and Technology, Qingdao University, Qingdao 266071, ChinaCollege of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, ChinaSchool of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing 100871, ChinaAuthentication is the first defence line to prevent malicious entities to access smart mobile devices (or SMD). Essentially, there exist many available cryptographic primitives to design authentication protocols. Oblivious transfer (OT) protocol is one of the important cryptographic primitives to design authentication protocols. The first lattice-based OT framework under universal composability (UC) model was designed by dual mode encryption and promoted us to find an alternative efficient scheme. We note that “lossy encryption” scheme is an extension of the dual mode encryption and can be used to design UC-secure OT protocol, but the investigations of OT via lossy encryption over the lattice are absent. Hence, in order to obtain an efficient authentication protocol by improving the performance of the UC-secure OT protocol, in this paper, we first design a multibit lossy encryption under the decisional learning with errors (LWE) assumption and then design a new variant of UC-secure OT protocol for authenticated protocol via lossy encryption scheme. Additionally, our OT protocol is secure against semihonest (static) adversaries in the common reference string (CRS) model and within the UC framework.http://dx.doi.org/10.1155/2018/5973285 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Zengpeng Li Can Xiang Chengyu Wang |
spellingShingle |
Zengpeng Li Can Xiang Chengyu Wang Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography Wireless Communications and Mobile Computing |
author_facet |
Zengpeng Li Can Xiang Chengyu Wang |
author_sort |
Zengpeng Li |
title |
Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography |
title_short |
Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography |
title_full |
Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography |
title_fullStr |
Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography |
title_full_unstemmed |
Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography |
title_sort |
oblivious transfer via lossy encryption from lattice-based cryptography |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2018-01-01 |
description |
Authentication is the first defence line to prevent malicious entities to access smart mobile devices (or SMD). Essentially, there exist many available cryptographic primitives to design authentication protocols. Oblivious transfer (OT) protocol is one of the important cryptographic primitives to design authentication protocols. The first lattice-based OT framework under universal composability (UC) model was designed by dual mode encryption and promoted us to find an alternative efficient scheme. We note that “lossy encryption” scheme is an extension of the dual mode encryption and can be used to design UC-secure OT protocol, but the investigations of OT via lossy encryption over the lattice are absent. Hence, in order to obtain an efficient authentication protocol by improving the performance of the UC-secure OT protocol, in this paper, we first design a multibit lossy encryption under the decisional learning with errors (LWE) assumption and then design a new variant of UC-secure OT protocol for authenticated protocol via lossy encryption scheme. Additionally, our OT protocol is secure against semihonest (static) adversaries in the common reference string (CRS) model and within the UC framework. |
url |
http://dx.doi.org/10.1155/2018/5973285 |
work_keys_str_mv |
AT zengpengli oblivioustransfervialossyencryptionfromlatticebasedcryptography AT canxiang oblivioustransfervialossyencryptionfromlatticebasedcryptography AT chengyuwang oblivioustransfervialossyencryptionfromlatticebasedcryptography |
_version_ |
1724976714634756096 |