Abstract
Some novel effective 1-out-of-2, 1-out-of-n, nā1-out-of-n, andm-out-of-n interactive and non-interactive oblivious transfer protocols (OT protocols) using a probabilistic encryption are presented. Their key information is adapted from corresponding Bellare ā Rivest fractional OT protocols and the encryption is carried out on ElGamal. They can be realized in a multiplicative as well as an additive group of prime order. It is shown that due to usage of different encryption keys this implementation can be simplified in such a way that single randomizer is sufficient for all encryptions. The proposal allows to increase the information rate by 2n/(n+1) times and to reduce by the same factor the computational complexity of the second round phase of interactive and of the communication phase of non-interactive m-out-of-n OT protocols explored probabilistic encryption. These propositions have potential applications in all cryptographic protocols based on the m-out-of-n oblivious transfer using probabilistic encryption including generalized oblivious transfer, in particular in electronic commerce.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University (1981)
Blum, M.: How to exchange (secret) keys. Trans. Computer SystemsĀ 1, 175ā193 (1983)
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Communications of the ACMĀ 28, 637ā647 (1985)
ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. TheoryĀ IT-31(4), 469ā472 (1985)
Bellare, M., Rivest, R.L.: Translucent cryptography ā an alternative to key escrow, and its implementation via fractional oblivious transfer. MIT/LCS Technical Report 683 (1990)
Brasard, G., CrĆ©peau, C., Robert, J.M.: Oblivious transfer and intersecting codes. IEEE Transaction of Information Theory, Special Issue on Coding and ComplexityĀ 42, 1769ā1780 (1996)
Mamontov, A.I., Frolov, A.B.: On one scheme for oblivious transfer of combinations of messages. MPEI BulletinĀ 3, 113ā119 (2005) (in Russian)
Mu, Y., Zhang, J., Varadharajan, V.: m out of n Oblivious Transfer. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.Ā 2384, pp. 395ā405. Springer, Heidelberg (2002)
Nyberg, K., Rueppel, R.A.: A new signature scheme based on the DSA giving message recovery. In: 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, pp. 58ā61 (1993)
Nyberg, K., Rueppel, R.A.: Message recovery for signature schemes based on the discrete logarithm problem, pp. 182ā193. Springer (1994)
Ishai, Y., Kushelevitz, E.: Private simultaneous messages protocols with applications. In: Proc. of ISTCS 1997, pp. 174ā184. IEEE Computer Society (1997)
Tassa, T.: Generalized oblivious transfer by secret sharing. Designs, Codes and CryptographyĀ 58, 1:11ā1:21 (2011)
Koblith, N.: A Course in number theory and cryptography. Springer, New York (1994)
Salomaa, A.: Public-key cryptography. Springer, New York (1990)
Koblitz, N.: Constructing Elliptic Curve Cryptosystems in Characteristic 2. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.Ā 537, pp. 156ā167. Springer, Heidelberg (1991)
Rosing, M.: Implementing elliptic curve cryptography. Manning Publications Co., Greenwich (1998)
Yao, A.C.: Protocols for secure computation. In: Proc. of IEEE Foundation of Computer Science (FOCS), pp. 160ā164 (1982)
Goldreich, O., Vainish, R.: How to Solve Any Protocol Probleman Efficiency Improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.Ā 293, pp. 73ā86. Springer, Heidelberg (1988)
Killian, J.: Founding cryptography on oblivious transfer. In: Proc. of the 20th Annual ACM Symposium on Theory of Computing (STOC), pp. 20ā31 (1988)
Noar, M., Pinkas, B.: Oblivious polynomial evaluation. In: Proc. of the 31st Annual ACM Symposium on Theory of Computing (STOC), pp. 245ā254 (1999)
Noar, M., Pinkas, B.: Computationally secure oblivious transfer. Journal of CryptologyĀ 18, 1ā35 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Frolov, A. (2013). Effective Oblivious Transfer Using a Probabilistic Encryption. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Complex Systems and Dependability. Advances in Intelligent and Soft Computing, vol 170. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30662-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-30662-4_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30661-7
Online ISBN: 978-3-642-30662-4
eBook Packages: EngineeringEngineering (R0)