Conditional Oblivious Cast
نویسندگان
چکیده
We introduce a new notion of conditional oblivious cast (COC), which involves three parties: a sender S and two receivers A and B. Receivers A and B own their secrets x and y, respectively, and the sender S holds the message m. In a COC scheme for the predicate Q (Q-COC), A and B send x and y in a masked form to S, and then S sends m to A and B such that they get m if and only if Q(x, y) = 1. Besides, the secrets x and y can not be revealed to another receiver nor the sender. We also extend COC to 1-out-of-2 COC (COC2) in which S holds two messages m0 and m1, and A and B get m1 if Q(x, y) = 1 and m0 otherwise. We give the definitions for COC and COC2, and propose several COC and COC2 schemes for “equality”, “inequality”, and “greater than” predicates. These are fundamental schemes that are useful in constructing more complex secure interactive protocols. Our schemes are efficiently constructed via homomorphic encryption schemes and proved secure under the security of these encryption schemes.
منابع مشابه
Constructions for Conditional Oblivious/converge Transfer/cast Constructions for Conditional Oblivious/converge Transfer/cast
In this paper, we introduce a new notion of conditional converge cast (CCC), such that we append the conditional property to converge cast. Additionally, we generalize the three primitives with conditional property, conditional oblivious transfer (COT), conditional oblivious cast (COC), and CCC. CCC is a three-party protocol which involves two senders S0 and S1 and a receiver R. S0 owns a secre...
متن کاملNew Communication-Efficient Oblivious Transfer Protocols Based on Pairings
We construct two simple families of two-message (n, 1)-oblivious transfer protocols based on degree-t homomorphic cryptosystems with the communication of respectively 1 + dn/te and 3 + dn/(t + 1)e ciphertexts. The construction of both families relies on efficient cryptocomputable conditional disclosure of secret protocols; the way this is done may be of independent interest. The currently most ...
متن کاملStrong Conditional Oblivious Transfer and Computing on Intervals
We consider the problem of securely computing the Greater Than (GT) predicate and its generalization – securely determining membership in a union of intervals. We approach these problems from the point of view of Q-Conditional Oblivious Transfer (Q-COT), introduced by Di Crescenzo, Ostrovsky and Rajagopalan [4]. Q-COT is an oblivious transfer that occurs iff predicate Q evaluates to true on the...
متن کاملConditional Oblivious Transfer and Timed-Release Encryption
We consider the problem of sending messages \into the future." Previous constructions for this task were either based on heuristic assumptions or did not provide anonymity to the sender of the message. In the public-key setting, we present an e cient and secure timed-release encryption scheme using a \time server" which inputs the current time into the system. The server has to only interact wi...
متن کاملOne-round secure comparison of integers
We consider the problem of securely evaluating the Greater Than (GT) predicate and its extension – transferring one of two secrets, depending on the result of comparison. We generalize our solutions and show how to securely decide membership in the union of a set of intervals. We then consider the related problem of comparing two encrypted numbers. We show how to efficiently apply our solutions...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006