• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wei Xiaochao, Jiang Han, Zhao Chuan. An Efficient 1-out-of-n Oblivious Transfer Protocol with Full Simulation[J]. Journal of Computer Research and Development, 2016, 53(11): 2475-2481. DOI: 10.7544/issn1000-1239.2016.20150505
Citation: Wei Xiaochao, Jiang Han, Zhao Chuan. An Efficient 1-out-of-n Oblivious Transfer Protocol with Full Simulation[J]. Journal of Computer Research and Development, 2016, 53(11): 2475-2481. DOI: 10.7544/issn1000-1239.2016.20150505

An Efficient 1-out-of-n Oblivious Transfer Protocol with Full Simulation

More Information
  • Published Date: October 31, 2016
  • Oblivious transfer (OT) is an important basic cryptographic tool, which can be used in the constructions of many other cryptographic protocols, such as secure multi-party computation (SMPC) protocols, private information retrieval (PIR) and so on. The 1-out-of-n oblivious transfer (OT\+1\-n) setting involves two parties, the sender S and the receiver R. More specificly, the sender has n values and the receiver wants to obtain only one value from them. At the same time, the receiver’s choice is unknown to the sender and the receiver gets no extra information about the other values he doesn’t choose. In this paper, we firstly propose an efficient OT\+1\-n protocol based on the decisional Diffie-Hellman (DDH) hard problem assumption with full simulation in the standard malicious model. The full simulation means that the protocol can be simulated when the receiver and the sender are corrupted respectively under the ideal/real simulation paradigm, and also this is the highest security level in the standard stand-alone model. The idea behind the protocol mainly benefits from the dual-mode cryptosystem and the combination of zero-knowledge proof of knowledge (ZKPOK) of Diffie-Hellman tuples. The protocol has constant number of interactive complexity, and the computation and communication complexity is just liner of n.
  • Related Articles

    [1]Liu Yongzhi, Qin Guiyun, Liu Pengtao, Hu Chengyu, Guo Shanqing. Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX[J]. Journal of Computer Research and Development, 2023, 60(12): 2709-2724. DOI: 10.7544/issn1000-1239.202220478
    [2]Wang Houzhen, Qin Wanying, Liu Qin, Yu Chunwu, Shen Zhidong. Identity Based Group Key Distribution Scheme[J]. Journal of Computer Research and Development, 2023, 60(10): 2203-2217. DOI: 10.7544/issn1000-1239.202330457
    [3]Li Zichen, Xie Ting, Zhang Juanmei, Xu Ronghua. Post Quantum Authenticated Key Exchange Protocol Based on Ring Learning with Errors Problem[J]. Journal of Computer Research and Development, 2019, 56(12): 2694-2701. DOI: 10.7544/issn1000-1239.2019.20180874
    [4]Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya. RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE[J]. Journal of Computer Research and Development, 2017, 54(10): 2187-2192. DOI: 10.7544/issn1000-1239.2017.20170477
    [5]Yang Xiaoyan, Hou Mengbo, Wei Xiaochao. Verifier-Based Three-Party Password Authenticated Key Exchange Protocol[J]. Journal of Computer Research and Development, 2016, 53(10): 2230-2238. DOI: 10.7544/issn1000-1239.2016.20160463
    [6]Wen Weiqiang, Wang Libin. A Strongly Secure Lattice-Based Key Exchange Protocol[J]. Journal of Computer Research and Development, 2015, 52(10): 2258-2269. DOI: 10.7544/issn1000-1239.2015.20150518
    [7]Sun Yu, Han Qingtong, and Liu Jianwei. Design of Key Exchange Protocol Based on Short Group Signature[J]. Journal of Computer Research and Development, 2012, 49(12): 2619-2622.
    [8]Gao Haiying. Provable Secure ID-Based Authenticated Key Agreement Protocol[J]. Journal of Computer Research and Development, 2012, 49(8): 1685-1689.
    [9]Pan Jiaxin and Wang Libin. A Modular Approach Towards Design and Analysis of Authenticated Key Exchange Protocol Based on Extended Canetti-Krawczyk Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1390-1399.
    [10]Ren Yongjun, Wang Jiandong, Wang Jian, Xu Dazhuan, and Zhuang Yi. Identity-Based Authenticated Key Agreement Protocols in the Standard Model[J]. Journal of Computer Research and Development, 2010, 47(9): 1604-1610.

Catalog

    Article views (1857) PDF downloads (549) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return