Title
Oblivious Transfer Based on the McEliece Assumptions
Publication Date
8-10-2008
Document Type
Book Chapter
Abstract
We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliece cryptosystem: the hardness of decoding random binary linear codes, and the difficulty of distinguishing a permuted generating matrix of Goppa codes from a random matrix. To our knowledge this is the first OT reduction to these problems only.
Publication Title
Information Theoretic Security
First Page
107
Last Page
117
Recommended Citation
Dowsley, R., Graaf, J. van de, Müller-Quade, J., & Nascimento, A. C. A. (2008). Oblivious Transfer Based on the McEliece Assumptions. In R. Safavi-Naini (Ed.), Information Theoretic Security (pp. 107-117). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-85093-9_11
COinS