{"id":"https://openalex.org/W4414593359","doi":"https://doi.org/10.3390/cryptography9040062","title":"A Survey of Post-Quantum Oblivious Protocols","display_name":"A Survey of Post-Quantum Oblivious Protocols","publication_year":2025,"publication_date":"2025-09-27","ids":{"openalex":"https://openalex.org/W4414593359","doi":"https://doi.org/10.3390/cryptography9040062"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography9040062","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9040062","pdf_url":"https://www.mdpi.com/2410-387X/9/4/62/pdf?version=1759041970","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/9/4/62/pdf?version=1759041970","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065295645","display_name":"Altana Khutsaeva","orcid":"https://orcid.org/0000-0001-5494-7142"},"institutions":[{"id":"https://openalex.org/I130523015","display_name":"Saint Petersburg State University of Aerospace and Instrumentation","ror":"https://ror.org/02rsxaa93","country_code":"RU","type":"education","lineage":["https://openalex.org/I130523015"]},{"id":"https://openalex.org/I173089394","display_name":"ITMO University","ror":"https://ror.org/04txgxn49","country_code":"RU","type":"education","lineage":["https://openalex.org/I173089394"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Altana Khutsaeva","raw_affiliation_strings":["Department of Information Security, State University of Aerospace Instrumentation, Saint Petersubrg 190000, Russia","Faculty of Secure Information Technologies, ITMO University, Saint Petersburg 197101, Russia"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, State University of Aerospace Instrumentation, Saint Petersubrg 190000, Russia","institution_ids":["https://openalex.org/I130523015"]},{"raw_affiliation_string":"Faculty of Secure Information Technologies, ITMO University, Saint Petersburg 197101, Russia","institution_ids":["https://openalex.org/I173089394"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067484393","display_name":"Anton Leevik","orcid":"https://orcid.org/0000-0003-1823-7877"},"institutions":[{"id":"https://openalex.org/I173089394","display_name":"ITMO University","ror":"https://ror.org/04txgxn49","country_code":"RU","type":"education","lineage":["https://openalex.org/I173089394"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Anton Leevik","raw_affiliation_strings":["Faculty of Secure Information Technologies, ITMO University, Saint Petersburg 197101, Russia"],"affiliations":[{"raw_affiliation_string":"Faculty of Secure Information Technologies, ITMO University, Saint Petersburg 197101, Russia","institution_ids":["https://openalex.org/I173089394"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087480596","display_name":"Sergey Bezzateev","orcid":"https://orcid.org/0000-0002-0924-6221"},"institutions":[{"id":"https://openalex.org/I130523015","display_name":"Saint Petersburg State University of Aerospace and Instrumentation","ror":"https://ror.org/02rsxaa93","country_code":"RU","type":"education","lineage":["https://openalex.org/I130523015"]},{"id":"https://openalex.org/I173089394","display_name":"ITMO University","ror":"https://ror.org/04txgxn49","country_code":"RU","type":"education","lineage":["https://openalex.org/I173089394"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Sergey Bezzateev","raw_affiliation_strings":["Department of Information Security, State University of Aerospace Instrumentation, Saint Petersubrg 190000, Russia","Faculty of Secure Information Technologies, ITMO University, Saint Petersburg 197101, Russia"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, State University of Aerospace Instrumentation, Saint Petersubrg 190000, Russia","institution_ids":["https://openalex.org/I130523015"]},{"raw_affiliation_string":"Faculty of Secure Information Technologies, ITMO University, Saint Petersburg 197101, Russia","institution_ids":["https://openalex.org/I173089394"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065295645"],"corresponding_institution_ids":["https://openalex.org/I130523015","https://openalex.org/I173089394"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":2.6124,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.92003481,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"9","issue":"4","first_page":"62","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/oblivious-transfer","display_name":"Oblivious transfer","score":0.6105999946594238},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4814999997615814},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4731000065803528},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.4560000002384186},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4381999969482422},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4357999861240387},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4318999946117401},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.37940001487731934},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.3668999969959259}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7908999919891357},{"id":"https://openalex.org/C53076038","wikidata":"https://www.wikidata.org/wiki/Q2915383","display_name":"Oblivious transfer","level":3,"score":0.6105999946594238},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4814999997615814},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4731000065803528},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.4560000002384186},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4381999969482422},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4357999861240387},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4318999946117401},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40549999475479126},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.37940001487731934},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.3668999969959259},{"id":"https://openalex.org/C2778814252","wikidata":"https://www.wikidata.org/wiki/Q5156715","display_name":"Composability","level":2,"score":0.35530000925064087},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3544999957084656},{"id":"https://openalex.org/C179145077","wikidata":"https://www.wikidata.org/wiki/Q5154130","display_name":"Communication complexity","level":2,"score":0.3481000065803528},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.3458000123500824},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.323199987411499},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3215999901294708},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3140999972820282},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.313400000333786},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.31209999322891235},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.3050000071525574},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.2962000072002411},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.290800005197525},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.275299996137619},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.27160000801086426},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.2651999890804291}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography9040062","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9040062","pdf_url":"https://www.mdpi.com/2410-387X/9/4/62/pdf?version=1759041970","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:82ef7da0ad1847a5a1d118517ece1620","is_oa":true,"landing_page_url":"https://doaj.org/article/82ef7da0ad1847a5a1d118517ece1620","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 9, Iss 4, p 62 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography9040062","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9040062","pdf_url":"https://www.mdpi.com/2410-387X/9/4/62/pdf?version=1759041970","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320327682","display_name":"Fondation Schlumberger pour l\u2019Education et la Recherche","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414593359.pdf","grobid_xml":"https://content.openalex.org/works/W4414593359.grobid-xml"},"referenced_works_count":114,"referenced_works":["https://openalex.org/W27238938","https://openalex.org/W43667552","https://openalex.org/W173953576","https://openalex.org/W1499934958","https://openalex.org/W1512194687","https://openalex.org/W1555154390","https://openalex.org/W1608796955","https://openalex.org/W1686844196","https://openalex.org/W1877240378","https://openalex.org/W1889757464","https://openalex.org/W1982146060","https://openalex.org/W1987667503","https://openalex.org/W1988374166","https://openalex.org/W1996068512","https://openalex.org/W2004839833","https://openalex.org/W2004881597","https://openalex.org/W2004957971","https://openalex.org/W2017464959","https://openalex.org/W2061619267","https://openalex.org/W2066180457","https://openalex.org/W2073346043","https://openalex.org/W2084652510","https://openalex.org/W2088492763","https://openalex.org/W2090601235","https://openalex.org/W2100460660","https://openalex.org/W2124218043","https://openalex.org/W2125744175","https://openalex.org/W2137147061","https://openalex.org/W2147668280","https://openalex.org/W2155040491","https://openalex.org/W2158453790","https://openalex.org/W2165297797","https://openalex.org/W2201681885","https://openalex.org/W2294070790","https://openalex.org/W2336770924","https://openalex.org/W2481158741","https://openalex.org/W2535199873","https://openalex.org/W2585043298","https://openalex.org/W2745861814","https://openalex.org/W2767023267","https://openalex.org/W2767035167","https://openalex.org/W2782492233","https://openalex.org/W2795104421","https://openalex.org/W2795336163","https://openalex.org/W2796314191","https://openalex.org/W2796933658","https://openalex.org/W2800652629","https://openalex.org/W2811492100","https://openalex.org/W2886714247","https://openalex.org/W2889629344","https://openalex.org/W2890999648","https://openalex.org/W2899793533","https://openalex.org/W2914533107","https://openalex.org/W2942255051","https://openalex.org/W2950598707","https://openalex.org/W2951264056","https://openalex.org/W2952708565","https://openalex.org/W2965570445","https://openalex.org/W2968502565","https://openalex.org/W2968964112","https://openalex.org/W2975836121","https://openalex.org/W2983813777","https://openalex.org/W2984215919","https://openalex.org/W2985716091","https://openalex.org/W2986933415","https://openalex.org/W3013638630","https://openalex.org/W3022916067","https://openalex.org/W3037145554","https://openalex.org/W3037429281","https://openalex.org/W3037625007","https://openalex.org/W3040384242","https://openalex.org/W3082533815","https://openalex.org/W3095923304","https://openalex.org/W3100458263","https://openalex.org/W3111514642","https://openalex.org/W3157351706","https://openalex.org/W3165229199","https://openalex.org/W3165766771","https://openalex.org/W3174055219","https://openalex.org/W3175787086","https://openalex.org/W3183199186","https://openalex.org/W3186747044","https://openalex.org/W3190233621","https://openalex.org/W3202874560","https://openalex.org/W3213785307","https://openalex.org/W3214651532","https://openalex.org/W3214727018","https://openalex.org/W3215333078","https://openalex.org/W4205423836","https://openalex.org/W4205616585","https://openalex.org/W4224324620","https://openalex.org/W4226075590","https://openalex.org/W4282936630","https://openalex.org/W4283397891","https://openalex.org/W4300584162","https://openalex.org/W4307884783","https://openalex.org/W4311322189","https://openalex.org/W4312245255","https://openalex.org/W4312463145","https://openalex.org/W4365934498","https://openalex.org/W4367663849","https://openalex.org/W4385563317","https://openalex.org/W4385654123","https://openalex.org/W4385654501","https://openalex.org/W4390865640","https://openalex.org/W4392567252","https://openalex.org/W4394595354","https://openalex.org/W4395962113","https://openalex.org/W4401752890","https://openalex.org/W4402264437","https://openalex.org/W4405309634","https://openalex.org/W4407679635","https://openalex.org/W4409854835","https://openalex.org/W4411337886"],"related_works":[],"abstract_inverted_index":{"Modern":[0],"distributed":[1],"computing":[2],"systems":[3],"and":[4,63,75,96,116,132,141,153],"applications":[5],"with":[6,38,69,120],"strict":[7],"privacy":[8],"requirements":[9],"demand":[10],"robust":[11],"data":[12,22,117],"confidentiality.":[13],"A":[14],"primary":[15],"challenge":[16],"involves":[17],"enabling":[18],"parties":[19],"to":[20],"exchange":[21],"or":[23],"perform":[24],"joint":[25],"computations.":[26],"These":[27],"interactions":[28],"must":[29],"avoid":[30],"revealing":[31],"private":[32],"information":[33],"about":[34],"the":[35,39,61,87,126],"data.":[36],"Protocols":[37],"obliviousness":[40],"property,":[41],"known":[42],"as":[43,113],"oblivious":[44,67,73,76,114,137],"protocols,":[45,68],"address":[46],"this":[47],"issue.":[48],"They":[49],"ensure":[50],"that":[51],"no":[52],"party":[53],"learns":[54],"more":[55],"than":[56],"necessary.":[57],"This":[58,106],"survey":[59],"analyzes":[60],"security":[62,155],"performance":[64],"of":[65],"post-quantum":[66,136],"a":[70],"focus":[71],"on":[72,150],"transfer":[74],"pseudorandom":[77],"functions.":[78],"The":[79],"evaluation":[80],"assesses":[81],"resilience":[82],"against":[83],"malicious":[84],"adversaries":[85],"in":[86,135,157],"Universal":[88],"Composability":[89],"framework.":[90],"Efficiency":[91],"is":[92,148],"quantified":[93],"through":[94],"communication":[95,133],"computational":[97,130],"overhead.":[98],"It":[99],"identifies":[100],"optimal":[101],"scenarios":[102],"for":[103],"these":[104],"protocols.":[105],"paper":[107],"also":[108],"surveys":[109],"related":[110],"primitives,":[111],"such":[112],"signatures":[115],"structures,":[118],"along":[119],"their":[121],"applications.":[122],"Key":[123],"findings":[124],"highlight":[125],"inherent":[127],"trade-offs":[128],"between":[129],"cost":[131],"complexity":[134],"constructions.":[138],"Open":[139],"challenges":[140],"future":[142],"research":[143],"directions":[144],"are":[145],"outlined.":[146],"Emphasis":[147],"placed":[149],"quantum-resistant":[151],"designs":[152],"formal":[154],"proofs":[156],"stronger":[158],"adversarial":[159],"models.":[160]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
