@inproceedings{76fd2bfd09fa47699316b92b4323665a,
title = "Post-quantum UC-secure oblivious transfer in the standard model with adaptive corruptions",
abstract = "Since the seminal result of Kilian, Oblivious Transfer (OT) has proven to be a fundamental primitive in cryptography. In such a scheme, a user is able to gain access to an element owned by a server, without learning more than this single element, and without the server learning which element the user has accessed. The NIST call for post-quantum encryption and signature schemes has revived the interest for cryptographic protocols based on post-quantum assumptions and the need for secure post-quantum OT schemes. In this paper, we show how to construct an OT scheme based on lattices, from a collision-resistant chameleon hash scheme (CH) and a CCA encryption scheme accepting a smooth projective hash function (SPHF). Note that our scheme does not rely on random oracles and provides UC security against adaptive corruptions assuming reliable erasures.",
keywords = "Lattices, Oblivious Transfer",
author = "Olivier Blazy and C{\'e}line Chevalier and Vu, \{Quoc Huy\}",
note = "Publisher Copyright: {\textcopyright} 2019 Copyright held by the owner/author(s). Publication rights licensed to ACM.; 14th International Conference on Availability, Reliability and Security, ARES 2019 ; Conference date: 26-08-2019 Through 29-08-2019",
year = "2019",
month = aug,
day = "26",
doi = "10.1145/3339252.3339280",
language = "English",
series = "ACM International Conference Proceeding Series",
publisher = "Association for Computing Machinery",
booktitle = "Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019",
}