Lottery Protocol Using Oblivious Transfer Based on ECC

被引:1
|
作者
Liu, Yining [1 ]
Liu, Gao [1 ]
Chang, Chin-Chen [2 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2017年 / 18卷 / 02期
基金
中国国家自然科学基金;
关键词
Electronic lottery; Oblivious transfer; Elliptic curve cryptography; AUTHENTICATION SCHEME; INTERNET; DESIGN;
D O I
10.6138/JIT.2017.18.2.20150909
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2014, a (t, n) electronic lottery protocol was proposed to achieve a series of functional properties including the correctness, fairness, randomness, traceability, unforgeability, robustness, practicability and efficiency. However, a weakness that destroys the fairness and randomness is often ignored, i.e., if at least t + 1 players collude, they can control the generation of a specific winning result to obtain the prize. Using the oblivious transfer based on elliptic curve cryptography (ECC), this paper presents an improved lottery protocol, which not only inherits the previous merits, but also resists against the collusion attack from the participants such that the fairness and the randomness are really achieved. Furthermore, the improved protocol is more efficient than the previous version due to the feature of ECC.
引用
收藏
页码:279 / 285
页数:7
相关论文
共 50 条
  • [1] A practical lottery using oblivious transfer
    Liu, Yi-Ning
    Cheng, Chi
    Jiang, Tao
    Chang, Chin-Chen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (02) : 277 - 282
  • [2] Fingerprinting protocol based on distributed providers using oblivious transfer
    Shinmyo, Urara
    Kuribayashi, Minoru
    Morii, Masakatu
    Tanaka, Hatsukazu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (10) : 2597 - 2602
  • [3] A Novel Oblivious Transfer Protocol using the Asymmetric Cryptosystem
    Chang, Chin-Chen
    Wu, Chia-Chi
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 75 - 78
  • [4] The Simplest Protocol for Oblivious Transfer
    Chou, Tung
    Orlandi, Claudio
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 40 - 58
  • [5] Verifiable oblivious transfer protocol
    Lee, NY
    Wang, CC
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (12): : 2890 - 2892
  • [6] Proxy oblivious transfer protocol
    Yao Gang
    Feng Dengguo
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 190 - +
  • [7] Universally composable oblivious transfer protocol based on VSPH
    Li, Feng-Hua
    Feng, Tao
    Ma, Jian-Feng
    Tongxin Xuebao/Journal on Communications, 2007, 28 (07): : 28 - 34
  • [8] A Quantum Oblivious Transfer Protocol
    Parakh, Abhishek
    NATURE OF LIGHT: WHAT ARE PHOTONS? V, 2013, 8832
  • [9] A Survey of Oblivious Transfer Protocol
    Yadav, Vijay Kumar
    Andola, Nitish
    Verma, Shekhar
    Venkatesan, S.
    ACM COMPUTING SURVEYS, 2022, 54 (10S)
  • [10] An efficient oblivious transfer protocol using residue number system
    Chang, C.-C. (alan3c@gmail.com), 1600, Femto Technique Co., Ltd. (15):