Robust t-out-of-n oblivious transfer mechanism based on CRT

被引:16
|
作者
Chang, Chin-Chen [1 ,2 ]
Lee, Jung-San [1 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
Oblivious transfer; Privacy; Communication; Blind signature; CRT;
D O I
10.1016/j.jnca.2008.03.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Providing private communications for involved participants, the oblivious transfer (OT) mechanism is an important component in many cryptography applications such as e-commerce, secret exchange, coin flipping by telephone and sending certified e-mail. Recently, Mu et al. extended the OT concept to a t-out-of-n version (denoted as OTtn). They claim that the novel method allows the chooser to simultaneously obtain t messages from the sender in each protocol run. Wu et al.'s improvements make an OT mechanism more flexible and efficient. Unfortunately, we propose a strategy to demonstrate that their method is unable to provide the privacy of the sender in this article. Furthermore, we present a novel OTtn mechanism based on the concepts of blind signature and the Chinese remainder theorem. This novel mechanism achieves the essentials of general OT mechanisms. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:226 / 235
页数:10
相关论文
共 50 条
  • [1] A provably secure t-out-of-n oblivious transfer mechanism based on blind signature
    Chang, Chin-Chen
    Cheng, Ting-Fang
    [J]. Journal of Information Hiding and Multimedia Signal Processing, 2014, 5 (01): : 1 - 12
  • [2] Robust non-interactive t-out-of-n oblivious transfer based on the RSA cryptosystem
    Chang, Ya-Fen
    Chang, Chin-Chen
    Cheng, Yi-Fang
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (01): : 93 - 109
  • [3] Efficient t-out-of-n oblivious transfer schemes
    Chang, Chin-Chen
    Lai, Yeu-Pong
    [J]. SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 3 - +
  • [4] Non-interactive t-out-of-n oblivious transfer based on the RSA cryptosystem
    Chang, Ya-Fen
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 45 - 48
  • [5] An efficient t-out-of-n oblivious transfer for information security and privacy protection
    Lou, Der-Chyuan
    Huang, Hui-Feng
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3759 - 3767
  • [6] Two t-out-of-n Oblivious Transfer Schemes with Designated Receiver
    ZHANG Jianhong~ 1
    2. Institute of Software of Chinese Academy of Sciences/State Key Laboratory of Information Security
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1903 - 1906
  • [7] A Practical Framework for t-Out-of-n Oblivious Transfer With Security Against Covert Adversaries
    Zeng, Bing
    Tartary, Christophe
    Xu, Peng
    Jing, Jiandu
    Tang, Xueming
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 465 - 479
  • [8] t-Out-of-n string/bit oblivious transfers revisited
    Wu, QH
    Qin, B
    Wang, CJ
    Chen, XF
    Wang, YM
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 410 - 421
  • [9] E-commerce Scheme Based on Proxy t-out-of-n Oblivious Signature
    Chen, Jingyu
    Gong, Linming
    Ma, Xiangxiang
    Wang, Daoshun
    [J]. International Journal of Network Security, 2024, 26 (05) : 851 - 860
  • [10] Robust T-out-of-N proxy signature based on RSA cryptosystems
    Chang, Ya-Fen
    Chang, Chin-Chen
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (02): : 425 - 431