TY - GEN
T1 - Two-Round Post-quantum Private Equality Test and OT from RLWE-Encryption
AU - Meng, Shengzhe
AU - Dang, Chengrui
AU - Liang, Bei
AU - Ding, Jintai
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.
PY - 2025
Y1 - 2025
N2 - This work uses the RLWE-encryption scheme to construct a novel and efficient two-round post-quantum protocol for a private equality test(PET) between two parties. The basic idea of this protocol is that the private key holder can successfully decrypt a ciphertext only when the associated correct public key pair is used for encryption. In the protocol, only half of the public key pair will be published, while two parties will encode their private message to the other half of the public key pair. Leveraging this approach, we expand the protocol into two separate post-quantum two-round 1-out-of-2 Oblivious Transfer (OT) protocols. While prior OT schemes based on Public Key Encryption have significant communication overhead, our protocols provide novel and efficient frameworks for constructing OT from RLWE encryption. Additionally, our protocols are proven to be secure in a semi-honest adversary model, reflecting their robustness for practical post-quantum security applications. Our PET protocol is significantly more efficient than alternatives based on RLWE homomorphic encryption.
AB - This work uses the RLWE-encryption scheme to construct a novel and efficient two-round post-quantum protocol for a private equality test(PET) between two parties. The basic idea of this protocol is that the private key holder can successfully decrypt a ciphertext only when the associated correct public key pair is used for encryption. In the protocol, only half of the public key pair will be published, while two parties will encode their private message to the other half of the public key pair. Leveraging this approach, we expand the protocol into two separate post-quantum two-round 1-out-of-2 Oblivious Transfer (OT) protocols. While prior OT schemes based on Public Key Encryption have significant communication overhead, our protocols provide novel and efficient frameworks for constructing OT from RLWE encryption. Additionally, our protocols are proven to be secure in a semi-honest adversary model, reflecting their robustness for practical post-quantum security applications. Our PET protocol is significantly more efficient than alternatives based on RLWE homomorphic encryption.
KW - Equality Test
KW - Oblivious Transfer
KW - Post-quantum
KW - RLWE
UR - http://www.scopus.com/inward/record.url?scp=85215325013&partnerID=8YFLogxK
U2 - 10.1007/978-981-97-8801-9_2
DO - 10.1007/978-981-97-8801-9_2
M3 - Conference Proceeding
AN - SCOPUS:85215325013
SN - 9789819788002
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 24
EP - 42
BT - Information and Communications Security - 26th International Conference, ICICS 2024, Proceedings
A2 - Katsikas, Sokratis
A2 - Xenakis, Christos
A2 - Lambrinoudakis, Costas
A2 - Kalloniatis, Christos
PB - Springer Science and Business Media Deutschland GmbH
T2 - 26th International Conference on Information and Communications Security, ICICS 2024
Y2 - 26 August 2024 through 28 August 2024
ER -