A survey of oblivious transfer protocol

VK Yadav, N Andola, S Verma… - ACM Computing Surveys …, 2022 - dl.acm.org
Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide
range of applications such as secure multi-party computation, private information retrieval …

A survey on cryptographic techniques for protecting big data security: present and forthcoming

S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …

Lossy cryptography from code-based assumptions

Q Dao, A Jain - Annual International Cryptology Conference, 2024 - Springer
Over the past few decades, we have seen a proliferation of advanced cryptographic
primitives with lossy or homomorphic properties built from various assumptions such as …

Compact, efficient and UC-secure isogeny-based oblivious transfer

YF Lai, SD Galbraith… - … Conference on the …, 2021 - Springer
Oblivious transfer (OT) is an essential cryptographic tool that can serve as a building block
for almost all secure multiparty functionalities. The strongest security notion against …

Non-interactive zero-knowledge from LPN and MQ

Q Dao, A Jain, Z ** - Annual International Cryptology Conference, 2024 - Springer
We give the first construction of non-interactive zero-knowledge (NIZK) arguments from post-
quantum assumptions other than Learning with Errors. In particular, we achieve NIZK under …

The hardness of LPN over any integer ring and field for PCG applications

H Liu, X Wang, K Yang, Y Yu - … International Conference on the Theory and …, 2024 - Springer
Learning parity with noise (LPN) has been widely studied and used in cryptography. It was
recently brought to new prosperity since Boyle et al.(CCS'18), putting LPN to a central role in …

Composable oblivious pseudo-random functions via garbled circuits

S Faller, A Ottenhues, J Ottenhues - International Conference on …, 2023 - Springer
Abstract Oblivious Pseudo-Random Functions (OPRFs) are a central tool for building
modern protocols for authentication and distributed computation. For example, OPRFs …

Obfuscation of pseudo-deterministic quantum circuits

J Bartusek, F Kitagawa, R Nishimaki… - Proceedings of the 55th …, 2023 - dl.acm.org
We show how to obfuscate pseudo-deterministic quantum circuits, assuming the quantum
hardness of learning with errors (QLWE) and post-quantum virtual black-box (VBB) …

Statistical zaps and new oblivious transfer protocols

V Goyal, A Jain, Z **, G Malavolta - … on the Theory and Applications of …, 2020 - Springer
We study the problem of achieving statistical privacy in interactive proof systems and
oblivious transfer–two of the most well studied two-party protocols–when limited rounds of …

Concretely efficient secure multi-party computation protocols: survey and more

D Feng, K Yang - Security and Safety, 2022 - sands.edpsciences.org
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on
their private inputs, and reveals nothing but the output of the function. In the last decade …