Almost optimal oblivious transfer from QA-NIZK

Olivier Blazy, Céline Chevalier, Paul Germouty

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We show how to build a UC-Secure Oblivious Transfer in the presence of Adaptive Corruptions from Quasi-Adaptive Non-Interactive Zero-Knowledge proofs. Our result is based on the work of Jutla and Roy at Asiacrypt 2015, where the authors proposed a constant-size very efficient PAKE scheme. As a stepping stone, we first show how a two-flow PAKE scheme can be generically transformed in an optimized way, in order to achieve an efficient three-flow Oblivious-Transfer scheme. We then compare our generic transformations to existing OT constructions and see that we manage to gain at least a factor 2 to the best known constructions. To the best of our knowledge, our scheme is the first UCsecure Oblivious Transfer with a constant size flow from the receiver, and nearly optimal size for the server.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings
EditorsDieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi
PublisherSpringer Verlag
Pages579-598
Number of pages20
ISBN (Print)9783319612034
DOIs
Publication statusPublished - 1 Jan 2017
Externally publishedYes
Event15th International Conference on Applied Cryptography and Network Security, ACNS 2017 - Kanazawa, Japan
Duration: 10 Jul 201712 Jul 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10355 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th International Conference on Applied Cryptography and Network Security, ACNS 2017
Country/TerritoryJapan
CityKanazawa
Period10/07/1712/07/17

Keywords

  • OT
  • Pairing-based cryptography
  • QA-NIZK
  • UC

Fingerprint

Dive into the research topics of 'Almost optimal oblivious transfer from QA-NIZK'. Together they form a unique fingerprint.

Cite this