In this work, we propose the first isogeny-based UC-secure oblivious transfer protocol in the presence of malicious adversaries without analogues in the Diffie-Hellman setting. The simple and compact CSIDH-based scheme consists of a constant number of isogeny computations. The underlying relaxed problem is called the computational reciprocal CSIDH problem which we can prove equivalent to the computational CSIDH problem with a quantum reduction.
Category / Keywords: cryptographic protocols / oblivious transfer, isogeny-based cryptography Date: received 21 Aug 2020, last revised 5 Sep 2020 Contact author: ylai276 at aucklanduni ac nz,s galbraith@auckland ac nz,cyprien delpechdesaintguilhem@kuleuven be Available format(s): PDF | BibTeX Citation Note: test Version: 20200905:145403 (All versions of this report) Short URL: ia.cr/2020/1012