Zhao Chun-ming, Ge Jiang-hua, Li Xin-guo. Signature-Based Enhanced Oblivious Transfer[J]. Journal of Electronics & Information Technology, 2006, 28(2): 303-306.
Citation:
Zhao Chun-ming, Ge Jiang-hua, Li Xin-guo. Signature-Based Enhanced Oblivious Transfer[J]. Journal of Electronics & Information Technology, 2006, 28(2): 303-306.
Zhao Chun-ming, Ge Jiang-hua, Li Xin-guo. Signature-Based Enhanced Oblivious Transfer[J]. Journal of Electronics & Information Technology, 2006, 28(2): 303-306.
Citation:
Zhao Chun-ming, Ge Jiang-hua, Li Xin-guo. Signature-Based Enhanced Oblivious Transfer[J]. Journal of Electronics & Information Technology, 2006, 28(2): 303-306.
Based on Schnorr (Elgamal) signature and (string) oblivious transfer, an enhanced oblivious transfer protocol is proposed which solved the access control problem for an oblivious transfer protocol. The protocol proposed has the property: the only receiver who has the signature issued by the central authority can open the message which he chose; the sender can not decide whether the receiver has the signature or not. That is the identity of the receiver can not be confirmed after the protocol. Under the Decisional Diffie-Hellman(DDH) assumption the proposed scheme has provable security.
Rabin M. How to exchange secrets by oblivious transferTechnical Report TR-81, Aiken Computation Laboratory, Harvard Univ., 1981.[2]Li Ninghui, Du Wenliang, Boneh Dan. Oblivious signature-based envelope. In Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003), Boston, Massachusetts, July 2003, New York, ACM Press, 2003: 182-189.[3]Tzeng W G. Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters[J].. IEEE Trans. on Computers.2004, 53(2):232-240[4]Schnorr C.Efficient identification and signature for smart cards.In:Advances in Cryptology-Crypto'89,volume 435 of Lecture Notes in Computer Science,Berlin,Springer-Verlag,1990:235-251.[5]ElGamal T.A public-key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Trans.on Information Theory.1985,31(4):469-472