Research Article

Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography

Table 1

The comparison of some related works with our scheme.

Scheme assumption message size bit Decone-time Decapplications

GPV [15]LWE/SIS 1PKE&IBE
PVW [10]LWE 1PKE&OT
LPS [16]SSP tPKE&OT

Our schemeLWE tPKE&OT