Skip to main content

A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition

  • Conference paper
  • First Online:
Intelligent Computing, Communication and Devices

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 309))

Abstract

Oblivious transfer is one of the most basic and widely used protocol primitives in cryptography. It can be described as a two-party protocol used for interaction between a sender and a receiver. A 1-out-of-2 oblivious transfer is the interaction between a sender and a receiver in which a sender has two strings m 0 and m 1. At the end of the interaction, receiver learns exactly one of the strings m 0 and m 1, while the sender learns nothing. Lindell showed how to achieve efficient and fully simulatable non-adaptive oblivious transfer under decisional Diffie–Hellman (DDH) problem, Nth residuosity and quadratic residuosity assumptions, as well as the assumption that homomorphic encryption exists. We propose a scheme based on this protocol under the assumption namely vector decomposition problem. Our scheme is non-adaptive and fully simulatable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Balasubramanian, R., Koblitz, N.: The improbability that an elliptic curve has sub exponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm. J. Cryptology. 11(2), 141–145 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  2. Duursma, I., Kiyavash, N.: The vector decomposition problem for elliptic and hyperelliptic curves. J. Ramanujan Math. Soc. 20(1), 5976 (2005)

    MathSciNet  Google Scholar 

  3. Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: CRYPTO 1982, pp. 205210 (1982)

    Google Scholar 

  4. Galbraith, S.D., Verheul, E.: An analysis of the vector decomposition problem. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 308327. Springer, Heidelberg (2008)

    Google Scholar 

  5. Green, M., Hohenberger, S: Blind identity-based encryption and simulatable oblivious transfer. In ASIACRYPT ‘07, vol. 4833 of LNCS, pp. 265–282 (2007)

    Google Scholar 

  6. Green, M., Hohenberger, S: Universally composable adaptive oblivious transfer. In ASIACRYPT, pp. 179–197 (2008)

    Google Scholar 

  7. Lindell, Y.: Efficient fully-simulatable oblivious transfer. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 5270. Springer, Heidelberg (2008)

    Google Scholar 

  8. Okamoto, T., Takashima, K.: Homomorphic encryption and signatures from vector decomposition. In Pairing, pp. 57–74 (2008)

    Google Scholar 

  9. Praveen, I., Sethumadhavan, M.: An efficient pairing computation, 1st international conference on security of internet of things (SecurIT 2012), pp. 145–149, 2012. ISBN: 978–1–4503–1822–88

    Google Scholar 

  10. Praveen, I., Sethumadhavan, M.: An application of vector decomposition problem in public key cryptography using homomorphic encryption, international conference on emerging research in computing, information, communication and applications-ERCICA (2013)

    Google Scholar 

  11. Rabin, M.O.: How to exchange secrets by oblivious transfer, technical report TR-81, Aiken Computation Laboratory, Harvard University (1981)

    Google Scholar 

  12. Yoshida, M.: Inseparable multiplex transmission using the pairing on elliptic curves and its application to watermarking. In: Fifth conference on algebraic geometry, number theory, coding theory and cryptography, University of Tokyo (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manoj Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Kumar, M., Praveen, I. (2015). A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 309. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2009-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2009-1_16

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2008-4

  • Online ISBN: 978-81-322-2009-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics