Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography
نویسندگان
چکیده
منابع مشابه
Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption
In this article, a new oblivious transfer (OT) protocol, secure in the presence of erasure-free one-sided active adaptive adversaries is presented. The new bit OT protocol achieves better communication complexity than the existing bit OT protocol in this setting. The new bit OT protocol requires fewer number of public key encryption operations than the existing bit OT protocol in this setting. ...
متن کاملOblivious Transfer with Hidden Access Control from Attribute-Based Encryption
The notion of oblivious transfer with hidden access control policies (HACOT) was recently proposed by Camenisch et al. (Public-Key Cryptography 2011). This primitive allows a user to anonymously query a database where each record is protected by a hidden attribute-based access control policy. At each query, the user either learns the value of a single record if the attributes in his key satisfy...
متن کاملEfficient Oblivious Transfer Protocols based on White-Box Cryptography
Oblivious transfer protocol is an important cryptographic primitive having numerous applications and particularly playing an essential role in secure multiparty computation protocols. On the other hand existing oblivious transfer protocols are based on computationally expensive public-key operations which remains the main obstacle for employing such protocols in practical applications. In this ...
متن کاملFounding Cryptography on Oblivious Transfer - Efficiently
Protocols for secure multiparty computation (MPC) can be divided into two types: (1) protocols that only guarantee security in the presence of an honest majority, and (2) protocols that guarantee security even when there is no honest majority. Known protocols of the first type are typically much more efficient than known protocols of the second type. This is true even in hybrid models that allo...
متن کاملBlind Identity-Based Encryption and Simulatable Oblivious Transfer
In an identity-based encryption (IBE) scheme, there is a key extraction protocol where a user submits an identity string to a master authority who then returns the corresponding secret key for that identity. In this work, we describe how this protocol can be performed efficiently and in a blind fashion for several known IBE schemes; that is, a user can obtain a secret key for an identity withou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Communications and Mobile Computing
سال: 2018
ISSN: 1530-8669,1530-8677
DOI: 10.1155/2018/5973285