2022
DOI: 10.48550/arxiv.2204.14171
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Quantum Universally Composable Oblivious Linear Evaluation

Abstract: Oblivious linear evaluation is a generalization of oblivious transfer, whereby two distrustful parties obliviously compute a linear function, f (x) = ax + b, i.e., each one provides their inputs that remain unknown to the other, in order to compute the output f (x) that becomes known to only one of them. From both a structural and a security point-of-view, oblivious linear evaluation is fundamental for arithmeticbased secure multi-party computation protocols. In the classical case it is known that oblivious li… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…Up until now, and to the best of our knowledge, the composable security of the protocol Π BBCS F com was only proven in the Fehr and Schaffner model [74] by Damgård et al [9] and in the quantum-UC by Unruh [81]. More recently, a generalization of Oblivious Transfer (Oblivious Linear Evaluation functionnality) developed under in the F com -hybrid model, was also proven to be secure in the quantum-UC model [99].…”
Section: Composabilitymentioning
confidence: 98%
“…Up until now, and to the best of our knowledge, the composable security of the protocol Π BBCS F com was only proven in the Fehr and Schaffner model [74] by Damgård et al [9] and in the quantum-UC by Unruh [81]. More recently, a generalization of Oblivious Transfer (Oblivious Linear Evaluation functionnality) developed under in the F com -hybrid model, was also proven to be secure in the quantum-UC model [99].…”
Section: Composabilitymentioning
confidence: 98%
“…Additionally, this primitive can also be used for secure multi-party computation (SMC) [ 13 ], private information retrieval [ 14 ], private set intersection [ 15 ], and privacy-preserving location-based services [ 16 ]. More recently, the first direct quantum protocol for a generalization of oblivious transfer known as oblivious linear evaluation was proposed [ 17 ]. In addition, quantum versions of oblivious transfer have recently been applied to SMC systems in the field of genomics medicine [ 18 , 19 ].…”
Section: Introductionmentioning
confidence: 99%