Practical t-out-n oblivious transfer and its applications

21Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

General constructions of f-out-n (string) oblivious transfers and millionaire protocol are presented using two-lock crypto-System, which enables Alice to send Bob secret without shared key. In the proposed t-out-n (string) oblivious transfer, Alice cannot determine which t messages Bob received even if she has unlimited computational power while Bob cannot learn the other n - t messages if the discrete logarithm problem is infeasible. The scheme requires constant rounds. Alice needs n + t modular exponentiations and Bob needs 2t modular exponentiations. Furthermore, the basic scheme is improved to meet public verifiability and extended to distributed oblivious transfers. As applications, efficient PIR scheme and millionaire protocol are built. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Wu, Q. H., Zhang, J. H., & Wang, Y. M. (2003). Practical t-out-n oblivious transfer and its applications. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2836, 226–237. https://doi.org/10.1007/978-3-540-39927-8_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free