Skip to main content
Contribution to Book
Oblivious Transfer Based on the McEliece Assumptions
Information Theoretic Security
  • Rafael Dowsley
  • Jeroen van Graaf
  • Jörn Müller-Quade
  • Anderson C. Nascimento, University of Washington Tacoma
Publication Date
8-10-2008
Document Type
Book Chapter
Abstract

We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliece cryptosystem: the hardness of decoding random binary linear codes, and the difficulty of distinguishing a permuted generating matrix of Goppa codes from a random matrix. To our knowledge this is the first OT reduction to these problems only.

Citation Information
Dowsley, R., Graaf, J. van de, Müller-Quade, J., & Nascimento, A. C. A. (2008). Oblivious Transfer Based on the McEliece Assumptions. In R. Safavi-Naini (Ed.), Information Theoretic Security (pp. 107-117). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-85093-9_11