Skip to main content

Effective Oblivious Transfer Using a Probabilistic Encryption

  • Conference paper
Complex Systems and Dependability

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 170))

Abstract

Some novel effective 1-out-of-2, 1-out-of-n, nāˆ’1-out-of-n, andm-out-of-n interactive and non-interactive oblivious transfer protocols (OT protocols) using a probabilistic encryption are presented. Their key information is adapted from corresponding Bellare āˆ’ Rivest fractional OT protocols and the encryption is carried out on ElGamal. They can be realized in a multiplicative as well as an additive group of prime order. It is shown that due to usage of different encryption keys this implementation can be simplified in such a way that single randomizer is sufficient for all encryptions. The proposal allows to increase the information rate by 2n/(n+1) times and to reduce by the same factor the computational complexity of the second round phase of interactive and of the communication phase of non-interactive m-out-of-n OT protocols explored probabilistic encryption. These propositions have potential applications in all cryptographic protocols based on the m-out-of-n oblivious transfer using probabilistic encryption including generalized oblivious transfer, in particular in electronic commerce.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University (1981)

    Google ScholarĀ 

  2. Blum, M.: How to exchange (secret) keys. Trans. Computer SystemsĀ 1, 175ā€“193 (1983)

    ArticleĀ  Google ScholarĀ 

  3. Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Communications of the ACMĀ 28, 637ā€“647 (1985)

    ArticleĀ  MathSciNetĀ  Google ScholarĀ 

  4. ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. TheoryĀ IT-31(4), 469ā€“472 (1985)

    ArticleĀ  MathSciNetĀ  Google ScholarĀ 

  5. Bellare, M., Rivest, R.L.: Translucent cryptography ā€“ an alternative to key escrow, and its implementation via fractional oblivious transfer. MIT/LCS Technical Report 683 (1990)

    Google ScholarĀ 

  6. Brasard, G., CrĆ©peau, C., Robert, J.M.: Oblivious transfer and intersecting codes. IEEE Transaction of Information Theory, Special Issue on Coding and ComplexityĀ 42, 1769ā€“1780 (1996)

    Google ScholarĀ 

  7. Mamontov, A.I., Frolov, A.B.: On one scheme for oblivious transfer of combinations of messages. MPEI BulletinĀ 3, 113ā€“119 (2005) (in Russian)

    Google ScholarĀ 

  8. Mu, Y., Zhang, J., Varadharajan, V.: m out of n Oblivious Transfer. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.Ā 2384, pp. 395ā€“405. Springer, Heidelberg (2002)

    ChapterĀ  Google ScholarĀ 

  9. Nyberg, K., Rueppel, R.A.: A new signature scheme based on the DSA giving message recovery. In: 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, pp. 58ā€“61 (1993)

    Google ScholarĀ 

  10. Nyberg, K., Rueppel, R.A.: Message recovery for signature schemes based on the discrete logarithm problem, pp. 182ā€“193. Springer (1994)

    Google ScholarĀ 

  11. Ishai, Y., Kushelevitz, E.: Private simultaneous messages protocols with applications. In: Proc. of ISTCS 1997, pp. 174ā€“184. IEEE Computer Society (1997)

    Google ScholarĀ 

  12. Tassa, T.: Generalized oblivious transfer by secret sharing. Designs, Codes and CryptographyĀ 58, 1:11ā€“1:21 (2011)

    Google ScholarĀ 

  13. Koblith, N.: A Course in number theory and cryptography. Springer, New York (1994)

    BookĀ  Google ScholarĀ 

  14. Salomaa, A.: Public-key cryptography. Springer, New York (1990)

    MATHĀ  Google ScholarĀ 

  15. Koblitz, N.: Constructing Elliptic Curve Cryptosystems in Characteristic 2. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.Ā 537, pp. 156ā€“167. Springer, Heidelberg (1991)

    Google ScholarĀ 

  16. Rosing, M.: Implementing elliptic curve cryptography. Manning Publications Co., Greenwich (1998)

    Google ScholarĀ 

  17. Yao, A.C.: Protocols for secure computation. In: Proc. of IEEE Foundation of Computer Science (FOCS), pp. 160ā€“164 (1982)

    Google ScholarĀ 

  18. Goldreich, O., Vainish, R.: How to Solve Any Protocol Probleman Efficiency Improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.Ā 293, pp. 73ā€“86. Springer, Heidelberg (1988)

    Google ScholarĀ 

  19. Killian, J.: Founding cryptography on oblivious transfer. In: Proc. of the 20th Annual ACM Symposium on Theory of Computing (STOC), pp. 20ā€“31 (1988)

    Google ScholarĀ 

  20. Noar, M., Pinkas, B.: Oblivious polynomial evaluation. In: Proc. of the 31st Annual ACM Symposium on Theory of Computing (STOC), pp. 245ā€“254 (1999)

    Google ScholarĀ 

  21. Noar, M., Pinkas, B.: Computationally secure oblivious transfer. Journal of CryptologyĀ 18, 1ā€“35 (2005)

    ArticleĀ  Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexander Frolov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Frolov, A. (2013). Effective Oblivious Transfer Using a Probabilistic Encryption. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Complex Systems and Dependability. Advances in Intelligent and Soft Computing, vol 170. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30662-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30662-4_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30661-7

  • Online ISBN: 978-3-642-30662-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics