The simplest protocol for oblivious transfer

T Chou, C Orlandi - Progress in Cryptology--LATINCRYPT 2015: 4th …, 2015 - Springer
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this
paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is …

Efficient and round-optimal oblivious transfer and commitment with adaptive security

R Canetti, P Sarkar, X Wang - International Conference on the Theory and …, 2020 - Springer
We construct the most efficient two-round adaptively secure bit-OT in the Common Random
String (CRS CRS) model. The scheme is UC secure under the Decisional Diffie-Hellman …

Blazing fast OT for three-round UC OT extension

R Canetti, P Sarkar, X Wang - Public-Key Cryptography–PKC 2020: 23rd …, 2020 - Springer
Oblivious Transfer (OT) is an important building block for multi-party computation (MPC).
Since OT requires expensive public-key operations, efficiency-conscious MPC protocols use …

Compactness vs collusion resistance in functional encryption

B Li, D Micciancio - … of Cryptography: 14th International Conference, TCC …, 2016 - Springer
We present two general constructions that can be used to combine any two functional
encryption (FE) schemes (supporting a bounded number of key queries) into a new …

Fast and universally-composable oblivious transfer and commitment scheme with adaptive security

M Byali, A Patra, D Ravi, P Sarkar - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Adaptive security embodies one of the strongest notions of security that allows an adversary
to corrupt parties at any point during protocol execution and gain access to its internal state …

ChronoCloak: An Integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination

A Zawia, MA Hasan - International Conference on Information Security, 2024 - Springer
With the increasing use of online digital content delivery, such as games, videos, and
magazine articles, there are scenarios where it is crucial to prevent premature revelation of …

“The simplest protocol for oblivious transfer” revisited

ZA Genç, V Iovino, A Rial - Information Processing Letters, 2020 - Elsevier
Abstract In 2015, Chou and Orlandi presented an oblivious transfer protocol that already
drew a lot of attention both from theorists and practitioners due to its extreme simplicity and …

A post-quantum light weight 1-out-n oblivious transfer protocol

B Mi, D Huang, S Wan, Y Hu, KKR Choo - Computers & Electrical …, 2019 - Elsevier
Security is a key concern in any IoT deployment, particularly if we have to take into
consideration future attacks facilitated by the use of quantum computers. Therefore, in this …

Endemic oblivious transfer via random oracles, revisited

Z Zhou, B Zhang, HS Zhou, K Ren - … on the Theory and Applications of …, 2023 - Springer
Abstract The notion of Endemic Oblivious Transfer (EOT) was introduced by Masny and
Rindal (CCS'19). EOT offers a weaker security guarantee than the conventional random OT; …

Symbolic security of garbled circuits

B Li, D Micciancio - 2018 IEEE 31st Computer Security …, 2018 - ieeexplore.ieee.org
We present the first computationally sound symbolic analysis of Yao's garbled circuit
construction for secure two party computation. Our results include an extension of the …