2020
DOI: 10.1109/access.2020.2967812
|View full text |Cite
|
Sign up to set email alerts
|

Permutable Cut-and-Choose Oblivious Transfer and Its Application

Abstract: Oblivious transfer (OT) is a significant primitive with wide use in secure two-party computation, private set intersection private and other cryptographic schemes. In the past ten years, different variants of OT primitive like cut-and-choose OT (CCOT) and outsourced OT (OOT), have been proposed so as to satisfy various emerging models. In this paper, we firstly propose and formalize a new primitive called permutable cut-and-choose OT (PCCOT) which generalizes the original CCOT functionality. Furthermore, we co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…Although the protocols for cut-and-choose can combine the check of circuits and the oblivious transfer for transmitting keys to solve the problem of selective failure attacks [5], these protocols use CCOT [6][7][8] to transmit garbled keys. One significant feature of CCOT is that it can only transmit keys associated with P 2 , s input wire.…”
Section: Introductionmentioning
confidence: 99%
“…Although the protocols for cut-and-choose can combine the check of circuits and the oblivious transfer for transmitting keys to solve the problem of selective failure attacks [5], these protocols use CCOT [6][7][8] to transmit garbled keys. One significant feature of CCOT is that it can only transmit keys associated with P 2 , s input wire.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, for a better view, we plot the experimental results in Figures 10 and 11. The total running time of our protocol is less than 2 s when the text length is 2 16 and the pattern length is 2 12 . Moreover, we observe that the total running time differs little between the different pattern lengths when the text length is 2 16 and 2 18 .…”
Section: Performancementioning
confidence: 99%
“…To better account for the efficiency of the protocol, we assess the performance of SWMQ. Specifically, the running time in the local area network (LAN) and wide area network (WAN) setting is less than 0.4 and 2 s, respectively, when the text length is 2 16 and the pattern length is 2 12 . In fact, our evaluation results suggest that SWMQ has ensured the high efficiency of the protocol while guaranteeing extended functionality.…”
Section: Our Contributionsmentioning
confidence: 99%
See 2 more Smart Citations