A verifiable distributed oblivious transfer protocol

4Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the various distributed oblivious transfer (DOT) protocols designed in an unconditionally secure environment, a receiver contacts k out of m servers to obtain one of the n secrets held by a sender. After a protocol has been executed, the sender has no information on the choice of the receiver and the receiver has no information on the secrets she did not obtain. These protocols are based on a semi-honest model: no mechanism prevents a group of malicious servers from disrupting the protocol such that the secret obtained by the receiver does not correspond to the chosen secret. This paper presents ongoing work towards the definition of the first unconditionally secure verifiable DOT protocol in the presence of an active adversary who may corrupt up to k - 1 servers. In addition to the active adversary, we also assume that the sender may (passively) corrupt up to k - 1 servers to learn the choice of the receiver. Similarly, the receiver may (passively) corrupt up to k - 1 servers to learn more than the chosen secret. Our DOT protocol allows the receiver to contact 4k - 3 servers to obtain one secret, while the required security is maintained. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Corniaux, C. L. F., & Ghodosi, H. (2011). A verifiable distributed oblivious transfer protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6812 LNCS, pp. 444–450). https://doi.org/10.1007/978-3-642-22497-3_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free