Advanced Search
Volume 29 Issue 8
Jan.  2011
Turn off MathJax
Article Contents
Zhao Chun-ming, Ge Jiang-hua, Li Xin-guo. Hidden Authentication Oblivious Transfer[J]. Journal of Electronics & Information Technology, 2007, 29(8): 1984-1986. doi: 10.3724/SP.J.1146.2006.00102
Citation: Zhao Chun-ming, Ge Jiang-hua, Li Xin-guo. Hidden Authentication Oblivious Transfer[J]. Journal of Electronics & Information Technology, 2007, 29(8): 1984-1986. doi: 10.3724/SP.J.1146.2006.00102

Hidden Authentication Oblivious Transfer

doi: 10.3724/SP.J.1146.2006.00102
  • Received Date: 2006-01-19
  • Rev Recd Date: 2006-10-08
  • Publish Date: 2007-08-19
  • Hidden authentication oblivious transfer based on k-out-of-n oblivious transfer and hidden credentials is proposed which solved the problem that standard certificated-based access control to oblivious transfer may exposure some sensitive information of the receiver. The scheme proposed has the property that only the receiver who has the required attribute credentials can open the message it chooses and the receiver need not provide to the sender any credentials. The sender can not decide whether the receiver can open the messages or not and the sender can not know which messages that the receiver acquires also. The security in the random oracle model is proved under the BDH assumption and the CT-CDH assumption.
  • loading
  • Tzeng W. Efficient 1-out-of-n oblivious transfer schemes with universal usable parameters [J].IEEE Trans on Computers.2004, 53(2):232-240[2]Naor M and Pinkas B. Efficient oblivious transfer protocols. Proceedings of SODA 2001, SIAM Symposium on Discrete Algorithms, New York ACM, 2001: 448-457.[3]Li N, John C, and William H. Design of a role-based trust management framework. Proceedings of the 2002 IEEE Symposium on Security and Privacy, Los Alamitos, California, IEEE Computer Society Press, 2002: 114-130.[4]Bradshaw R, Holt J, and Seamons K. Concealing complex policies with hidden credentials. Eleventh ACM Conference on Computer and Communications Security, New York, ACM Press, 2004: 146-157.[5]Chu C and Tzeng W. Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries. Public Key Cryptography - PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography(Lecture Notes in Computer Science), Berlin, Springer-verlag, 2005, Vol. 3386: 23-26.[6]Boneh D and Franklin M. Identity-based encryption from the Weil pairing. Proceedings of Crypto 2001 (Lecture Notes in Computer Science), Berlin, Springer-verlag, 2001, Vol. 2139: 213-229.[7]Boldyreva A. Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme[J].Proceedings of the Public-Key Cryptography (PKC03) (Lecture Notes in Computer Science), Berlin, Springer-Verlag.2003, Vol. 2567:31-46
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3498) PDF downloads(915) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return