Oblivious transfer based on the McEliece assumptions

Rafael Dowsley, Jeroen Van De Graaf, Jörn Müller-Quade, Anderson C.A. Nascimento

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

22 Citations (Scopus)

Abstract

We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliece cryptosystem: the hardness of decoding random binary linear codes, and the difficulty of distinguishing a permuted generating matrix of Goppa codes from a random matrix. To our knowledge this is the first OT reduction to these problems only.

Original languageEnglish
Title of host publicationInformation Theoretic Security - Third International Conference, ICITS 2008, Proceedings
EditorsReihaneh Safavi-Naini
PublisherSpringer
Pages107-117
Number of pages11
ISBN (Print)3540850929, 9783540850922
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event3rd International Conference on Information Theoretic Security, ICITS 2008 - Calgary, AB, Canada
Duration: 10 Aug 200813 Aug 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5155 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Conference on Information Theoretic Security, ICITS 2008
Country/TerritoryCanada
CityCalgary, AB
Period10/08/0813/08/08

Cite this