Paper 2013/077

UC-Secure Multi-Session OT Using Tamper-Proof Hardware

Kaoru Kurosawa, Ro Nojima, and Le Trieu Phong


In this paper, we show the first UC-secure {\it multi-session} OT protocol using tamper-proof hardware tokens. The sender and the receiver exchange tokens only at the beginning. Then these tokens are reused in arbitrarily many sessions of OT. The proposed scheme is UC-secure against static adversaries if the DDH assumption holds and a unique signature scheme exists. There exist a unique signature schemes under the Many DH assumption or under the DDHE assumption (in the standard model).

Note: The random oracle is removed.

Available format(s)
Publication info
Published elsewhere. Unknown where it was published
tamper-proof hardware tokenUC-securitymulti-session OT
Contact author(s)
kurosawa @ mx ibaraki ac jp
2013-04-24: last of 2 revisions
2013-02-20: received
See all versions
Short URL
Creative Commons Attribution


      author = {Kaoru Kurosawa and Ro Nojima and Le Trieu Phong},
      title = {UC-Secure Multi-Session OT Using Tamper-Proof Hardware},
      howpublished = {Cryptology ePrint Archive, Paper 2013/077},
      year = {2013},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.