An efficient oblivious transfer protocol with access control

被引:5
|
作者
Liao, Yaqing [1 ]
Zhou, Jing [1 ]
Yang, Yang [1 ]
Ruan, Ou [1 ]
机构
[1] Hubei Univ Technol, Sch Comp, Collaborat Innovat Ctr Ind Bigdata, Wuhan, Hubei, Peoples R China
关键词
Oblivious Transfer; Access Control; Privacy; Anonymous access; ENCRYPTION;
D O I
10.1109/AsiaJCIS.2018.00014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid development of internet in our daily life, protecting privacy has become a focus of attention. To create privacy-preserving database and prevent illegal user access the database, oblivious transfer with access control (OTAC) was proposed, which is a cryptographic primitive that extends from oblivious transfer (OT). It allows a user to anonymously query a database where each message is protected by an access control policy and only if the user' s attribute satisfy that access control policy can obtain it. In this paper, we propose a new protocol for OTAC by using elliptic curve cryptography, which is more efficient compared to the existing similar protocols. In our scheme, we also preserves user's anonymity and ensures that the user's attribute is not disclosed to the sender. Additionally, our construction guarantees the user to verify the correctness of messages recovered at the end of each transfer phase.
引用
收藏
页码:29 / 34
页数:6
相关论文
共 50 条
  • [31] More Efficient Oblivious Transfer Extensions
    Asharov, Gilad
    Lindell, Yehuda
    Schneider, Thomas
    Zohner, Michael
    JOURNAL OF CRYPTOLOGY, 2017, 30 (03) : 805 - 858
  • [32] More Efficient Oblivious Transfer Extensions
    Gilad Asharov
    Yehuda Lindell
    Thomas Schneider
    Michael Zohner
    Journal of Cryptology, 2017, 30 : 805 - 858
  • [33] Efficient oblivious transfer with membership verification
    Liu, Weiwei
    Sun, Da-Zhi
    Tian, Yangguang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (09):
  • [34] An Efficient Protocol for Oblivious DFA Evaluation and Applications
    Mohassel, Payman
    Niksefat, Salman
    Sadeghian, Saeed
    Sadeghiyan, Babak
    TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 398 - +
  • [35] A secure protocol for the oblivious transfer (extended abstract)
    Fischer, MJ
    Micali, S
    Rackoff, C
    JOURNAL OF CRYPTOLOGY, 1996, 9 (03) : 191 - 195
  • [36] OBLIVIOUS TRANSFER WITH ACCESS CONTROL AND IDENTITY-BASED ENCRYPTION WITH ANONYMOUS KEY ISSUING
    Xu Lingling* Zhang Fangguo* Wen Yamin* ** *(School of Information Science and Technology
    Journal of Electronics(China), 2011, (Z1) : 571 - 579
  • [37] OBLIVIOUS TRANSFER WITH ACCESS CONTROL AND IDENTITY-BASED ENCRYPTION WITH ANONYMOUS KEY ISSUING
    Xu Lingling Zhang Fangguo Wen Yamin School of Information Science and TechnologySun Yatsen UniversityGuangzhou China School of Mathematics and Computational ScienceGuangdong University of Business StudiesGuangzhou China
    JournalofElectronics(China), 2011, 28(Z1) (China) : 571 - 579
  • [38] Communication-efficient distributed oblivious transfer
    Beimel, Amos
    Chee, Yeow Meng
    Wang, Huaxiong
    Zhang, Liang Feng
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (04) : 1142 - 1157
  • [39] Efficient Traceable Oblivious Transfer and Its Applications
    Liu, Weiwei
    Zhang, Yinghui
    Mu, Yi
    Yang, Guomin
    Tian, Yangguang
    INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 610 - 621
  • [40] Coherent attacks on a practical quantum oblivious transfer protocol
    He, Guang-Ping
    CHINESE PHYSICS B, 2018, 27 (10)