期刊文献+

Two t-out-of-n Oblivious Transfer Schemes with Designated Receiver

Two t-out-of-n Oblivious Transfer Schemes with Designated Receiver
下载PDF
导出
摘要 Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n + 2t + 1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n + 3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable. Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n + 2t + 1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n + 3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1903-1906,共4页 武汉大学学报(自然科学英文版)
基金 Supported by Scientific Research Common Programof Beijing Municipal Commission of Education ( KM200610009011) Open Fund of State Key Laboratory of Information Security(Institute of Software of Chinese Academy of Sciences) (02-4)
关键词 oblivious transfer designated verifier EFFICIENCY oblivious transfer designated verifier efficiency
  • 相关文献

参考文献10

  • 1Rabin,O. Exchanges Secret by Oblivious Transfer . 1981
  • 2S.Even,,O.Goldreich,,A.Lempel.Arandomized Protocol for Signing Contracts[].Communications of the ACM.1985
  • 3Wenguey,Tzeng. Effccient 1-out-of-n Oblivious Transfer Schemes [C]//Proceeding of Public-Key Cryptography 2002 . 2002
  • 4Mu Y,Zhang J,Varadharajan V.M out of n Oblivious Transfer, Information Security and Privacy[].AISP : LNCS.2002
  • 5Chu Cheng-Kang,Tzeng Wen-Guey.Efficient k-out-of-n Obvious Transfer Schemes with Adaptive and Non-adaptive Queries[].Procof the th International Workshop on Theory and Practice in Public Key Cryptography.2005
  • 6Jianhong,Zhang,Yumin,Wang.Two Provably Securek-out-of-n Oblivious Transfer Schemes[].Journal of Applied Mathematics.2005
  • 7Kilian,J. Founding Cryptography on Oblivious Transfer Scheme [C]//Proceeding of the 30 th Annual ACM Symposium on Theory of Computation . 2004
  • 8Naor M,Pinkas B.Oblivious Transfer and Polynomial Eval- uation[].Proceedingof theth Annual ACMSymposi- umon the Theory of Computing.1999
  • 9Naor M,Pinkas B.Oblivious Transfer with Adaptive Que- ries[].Proceedingof Advances in Cryptology-Crypto.1999
  • 10Brassard G,Crepeau C,Robert J M.Information Theoretic Reductionamong Disclosure Problems[].Proeedingof th IEEE Symposiumon Foundations of Computer Science.1986

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部