You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This makes the base OT post-quantum secure by utilizing ML-KEM key
encapsulation via https://crates.io/crates/ml-kem.
We keep the Simplest OT as default base OT and make ML-KEM optional by
adding a compile-time feature, namely `ml-kem-base-ot`.
Note that `MlKemOt` is not `trait Malicious` secure (it is only
`trait SemiHonest` secure) as the receiver can generate two real
decapsulation keys, allowing it to decapsulate both ciphertexts and
learn both OT messages. When used in an OT extension protocol,
semi-honest base OT is sufficient for the whole protocol to have
malicious security.
Copy file name to clipboardExpand all lines: README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ The `cryprot` crates implement several **cryp**tographic **prot**ocols and utili
11
11
|[`cryprot-net`]| Networking abstractions built atop [s2n-quic](https://docs.rs/s2n-quic/latest/s2n_quic/). |[](https://crates.io/crates/cryprot-net)|[](https://docs.rs/cryprot-net)|
12
12
|[`cryprot-pprf`]| Distributed PPRF implementation used in Silent OT [[BCG+19]](https://eprint.iacr.org/2019/1159), based on [libOTe](https://github.com/osu-crypto/libOTe). |[](https://crates.io/crates/cryprot-pprf)|[](https://docs.rs/cryprot-pprf)|
13
13
|[`cryprot-codes`]| Expand-convolute linear code [[RRT23]](https://eprint.iacr.org/2023/882), based on [libOTe](https://github.com/osu-crypto/libOTe), used in Silent OT. |[](https://crates.io/crates/cryprot-codes)|[](https://docs.rs/cryprot-codes)|
14
-
|[`cryprot-ot`]| Oblivious transfer implementations:<br>• Base OT: "Simplest OT" [[CO15]](https://eprint.iacr.org/2015/267)<br>• OT extensions: [[IKNP03]](https://www.iacr.org/archive/crypto2003/27290145/27290145.pdf)<br>• Malicious OT extension: [[KOS15]](https://eprint.iacr.org/2015/546.pdf)<br>• Silent OT extension: [[BCG+19]](https://eprint.iacr.org/2019/1159) Silent OT using [[RRT23]](https://eprint.iacr.org/2023/882) code and optional [[YWL+20]](https://dl.acm.org/doi/pdf/10.1145/3372297.3417276) consistency check for malicious security. |[](https://crates.io/crates/cryprot-ot)|[](https://docs.rs/cryprot-ot)|
14
+
|[`cryprot-ot`]| Oblivious transfer implementations:<br>• Base OT: "Simplest OT" [[CO15]](https://eprint.iacr.org/2015/267)<br>• Base OT (post-quantum, optional): [ML-KEM-768](https://crates.io/crates/ml-kem) based OT [[FIPS 203]](https://csrc.nist.gov/pubs/fips/203/final)<br>• OT extensions: [[IKNP03]](https://www.iacr.org/archive/crypto2003/27290145/27290145.pdf)<br>• Malicious OT extension: [[KOS15]](https://eprint.iacr.org/2015/546.pdf)<br>• Silent OT extension: [[BCG+19]](https://eprint.iacr.org/2019/1159) Silent OT using [[RRT23]](https://eprint.iacr.org/2023/882) code and optional [[YWL+20]](https://dl.acm.org/doi/pdf/10.1145/3372297.3417276) consistency check for malicious security. |[](https://crates.io/crates/cryprot-ot)|[](https://docs.rs/cryprot-ot)|
15
15
16
16
Documentation for the latest main branch state is available [here](https://robinhundt.github.io/CryProt/cryprot_ot/).
Copy file name to clipboardExpand all lines: cryprot-ot/README.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,7 @@
6
6
Oblivious transfer implementations. Currently implemented are the following:
7
7
8
8
- base OT: "Simplest OT" [[CO15](https://eprint.iacr.org/2015/267)]
9
+
- base OT (post-quantum, optional): [ML-KEM-768](https://crates.io/crates/ml-kem) based OT [[FIPS 203](https://csrc.nist.gov/pubs/fips/203/final)]
9
10
- semi-honest OT extension: optimized [[IKNP03](https://www.iacr.org/archive/crypto2003/27290145/27290145.pdf)] protocol
10
11
- malicious OT extension: optimized [[KOS15]](https://eprint.iacr.org/2015/546.pdf) protocol
11
12
- silent OT extension: [[BCG+19](https://eprint.iacr.org/2019/1159)] silent OT using [[RRT23](https://eprint.iacr.org/2023/882)] code (semi-honest and malicious with [[YWL+20](https://dl.acm.org/doi/pdf/10.1145/3372297.3417276)] consistency check)
@@ -27,7 +28,7 @@ Silent OT will perform faster for smaller numbers of OTs at slightly increased c
27
28
28
29
Our OT implementations should be on par or faster than those in libOTe. In the future we want to benchmark libOTe on the same hardware for a fair comparison.
0 commit comments