An efficient oblivious transfer protocol with access control

被引:5
|
作者
Liao, Yaqing [1 ]
Zhou, Jing [1 ]
Yang, Yang [1 ]
Ruan, Ou [1 ]
机构
[1] Hubei Univ Technol, Sch Comp, Collaborat Innovat Ctr Ind Bigdata, Wuhan, Hubei, Peoples R China
关键词
Oblivious Transfer; Access Control; Privacy; Anonymous access; ENCRYPTION;
D O I
10.1109/AsiaJCIS.2018.00014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid development of internet in our daily life, protecting privacy has become a focus of attention. To create privacy-preserving database and prevent illegal user access the database, oblivious transfer with access control (OTAC) was proposed, which is a cryptographic primitive that extends from oblivious transfer (OT). It allows a user to anonymously query a database where each message is protected by an access control policy and only if the user' s attribute satisfy that access control policy can obtain it. In this paper, we propose a new protocol for OTAC by using elliptic curve cryptography, which is more efficient compared to the existing similar protocols. In our scheme, we also preserves user's anonymity and ensures that the user's attribute is not disclosed to the sender. Additionally, our construction guarantees the user to verify the correctness of messages recovered at the end of each transfer phase.
引用
收藏
页码:29 / 34
页数:6
相关论文
共 50 条
  • [1] An Efficient Accountable Oblivious Transfer With Access Control
    Liu, Xin
    Zhang, Bin
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [2] Oblivious Transfer with Access Control
    Camenisch, Jan
    Dubovitskaya, Maria
    Neven, Gregory
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 131 - 140
  • [3] An efficient quantum oblivious transfer protocol
    Sarkar, Sushmita
    Srivastava, Vikas
    Mohanty, Tapaswini
    Debnath, Sumit Kumar
    Mesnager, Sihem
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 14037 - 14048
  • [4] Efficient oblivious transfers with access control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (04) : 827 - 837
  • [5] Oblivious Transfer with Threshold Access Control
    Xu, Ling-Ling
    Zhang, Fang-Guo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2012, 28 (03) : 555 - 570
  • [6] Oblivious Transfer with Hidden Access Control Policies
    Camenisch, Jan
    Dubovitskaya, Maria
    Neven, Gregory
    Zaverucha, Gregory M.
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 192 - +
  • [7] Unlinkable Updatable Databases and Oblivious Transfer with Access Control
    Damodaran, Aditya
    Rial, Alfredo
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 584 - 604
  • [8] An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications
    Zhao, Shengnan
    Song, Xiangfu
    Jiang, Han
    Ma, Ming
    Zheng, Zhihua
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [9] An efficient oblivious transfer protocol using residue number system
    Chang, C.-C. (alan3c@gmail.com), 1600, Femto Technique Co., Ltd. (15):
  • [10] The Simplest Protocol for Oblivious Transfer
    Chou, Tung
    Orlandi, Claudio
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 40 - 58