Advanced Search
Volume 28 Issue 8
Sep.  2010
Turn off MathJax
Article Contents
Zhao Chun-ming, Ge Jian-hua, Li Xin-guo. Oblivious Transfer Protocol with RSA-Based Access Control[J]. Journal of Electronics & Information Technology, 2006, 28(8): 1501-1503.
Citation: Zhao Chun-ming, Ge Jian-hua, Li Xin-guo. Oblivious Transfer Protocol with RSA-Based Access Control[J]. Journal of Electronics & Information Technology, 2006, 28(8): 1501-1503.

Oblivious Transfer Protocol with RSA-Based Access Control

  • Received Date: 2004-12-06
  • Rev Recd Date: 2005-04-28
  • Publish Date: 2006-08-19
  • Based on RSA signature and (string) oblivious transfer, an oblivious transfer protocol is proposed which solved the access control problem for an oblivious transfer protocol. The protocol proposed has the property: the only receiver who has the signature issued by the central authority can open the message which he chose; the sender can not decide whether the receiver has the signature or not. That is the identity of the receiver can not be confirmed after the protocol. Under the Decisional Diffie-Hellman(DDH) assumption the proposed scheme has provable security. The proposed scheme employs the standard RSA signature and Elgamal encryption.
  • loading
  • Rabin M. How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard Univ., 1981.[2]Li Ninghui, Du Wenliang, Boneh Dan. Oblivious signature-based envelope[A]. In Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003)[C], Boston, Massachusetts, ACM Press, New York, July 2003:182-189.[3]Rivest R L, Shamir A, Adleman L M. A method for obtaining digital signatures and public key cryptosystems[J].Communications of the ACM.1978, 21(2):120-126[4]Tobias Christian. Practical oblivious transfer protocols. [A]. 5th International Workshop on Information Hiding(IH 2002)[C]. Springer Verlag, LNCS 2578,Noordwijkerhout, The Netherlands, October 2002:415-426.[5]Ateniese G. Verifiable encryption of digital signatures and applications[J].ACM Transactions on Information and System Security.2004,7(1):1-20[6]ElGamal T. A Public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Trans. Information Theory.1985, 31(4):469-472[7]Tsiounis Y, Yung M. On the security of ElGamal-based encryption[A]. Proc. of PKC '98[C]. Springer Verlag, LNCS 1431, Yokohama, Japan, 1998: 117-134.[8]Aiello B.[J].Ishai Y, Reingold O. Priced oblivious transfer: How to sell digital goods[A]. Proc. Advances in Cryptology (Eurocrypt01)[C]. Springer Verlag, LNCS 2045, Innsbruck, Austria.2001,:-
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2274) PDF downloads(944) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return