Oblivious Transfer Based on the McEliece Assumptions
We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliece cryptosystem: the hardness of decoding random binary linear codes, and the difficulty of distinguishing a permuted generating matrix of Goppa codes from a random matrix. To our knowledge this is the first OT reduction to these problems only.
Information Theoretic Security
Dowsley, R., Graaf, J. van de, Müller-Quade, J., & Nascimento, A. C. A. (2008). Oblivious Transfer Based on the McEliece Assumptions. In R. Safavi-Naini (Ed.), Information Theoretic Security (pp. 107-117). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-85093-9_11
This document is currently not available here.