• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao. An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol[J]. Journal of Computer Research and Development, 2017, 54(10): 2215-2223. DOI: 10.7544/issn1000-1239.2017.20170463
Citation: Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao. An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol[J]. Journal of Computer Research and Development, 2017, 54(10): 2215-2223. DOI: 10.7544/issn1000-1239.2017.20170463

An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol

More Information
  • Published Date: September 30, 2017
  • Oblivious transfer (OT) is a cryptographic primitive used for choice information hiding for the receiver. As a basic tool for high-level multi-party cryptographic protocol construction, it plays an important role in numerous specific applications. In the k-out-of-n OT(OT\+k\-n), the receiver acquires k selections among the n choice in an oblivious manner. Generally, the construction of the OT\+k\-n involves lots of group exponential operations, which brings a heavy burden for embedded devices with limited computational capabilities. With the proliferation of cloud computing, it is feasible to implement complex cryptographic primitives with the support of powerful computing recourse and high-speed dedicated network provided by the cloud service provider (CSP). In this paper, we propose a service-assisted k-out-of-n OT protocol in single server architecture, which outsources the vast majority of exponentiation operations to the cloud. This scheme is constructed with secret sharing and other fundamental public-key primitives, and it achieves provable security on none-collusion semi-honest model under the decisional Diffie-Hellamn (DDH) hard problem; meanwhile it ensures data privacy against the cloud server. Besides, a detailed description of scheme construction and security proof is presented in the context. As a basic cryptographic primitive in cloud environment, the single server-added oblivious transfer protocol will play an important role in designs of general cloud-assisted multi-party computation protocol as well as developments of secure and efficient cloud service software.
  • Related Articles

    [1]Yang Yong, Meng Xiangru, Kang Qiaoyan, Chen Gang. Dynamic Service Function Chain Migration Method Based on Resource Requirements Prediction[J]. Journal of Computer Research and Development, 2023, 60(5): 1151-1163. DOI: 10.7544/issn1000-1239.202111206
    [2]Zhou Peng, Wu Yanjun, Zhao Chen. A Programming Paradigm Combining Programmer and Neural Network to Promote Automated Program Generation[J]. Journal of Computer Research and Development, 2021, 58(3): 638-650. DOI: 10.7544/issn1000-1239.2021.20200298
    [3]Zu Jiachen, Hu Guyu, Yan Jiajie, Li Shiji. Resource Management of Service Function Chain in NFV Enabled Network: A Survey[J]. Journal of Computer Research and Development, 2021, 58(1): 137-152. DOI: 10.7544/issn1000-1239.2021.20190823
    [4]Deng Li, Wu Weinan, Zhu Zhengyi, Chen Ming. DiffSec: A Differentiated Intelligent Network Security Service Model[J]. Journal of Computer Research and Development, 2019, 56(5): 955-966. DOI: 10.7544/issn1000-1239.2019.20190019
    [5]Huang Rui, Zhang Hongqi, Chang Dexian. A Backup and Recovery Mechanism for Security Service Chain Fault in Network Function Virtualization Environment[J]. Journal of Computer Research and Development, 2018, 55(4): 768-781. DOI: 10.7544/issn1000-1239.2018.20170942
    [6]Liu Yi, Zhang Hongqi, Yang Yingjie, Chang Dexian. A Hierarchical Method for Survivable Service Function Chain Embedding[J]. Journal of Computer Research and Development, 2018, 55(4): 748-767. DOI: 10.7544/issn1000-1239.2018.20170938
    [7]Xu Ran, Wang Wendong, Gong Xiangyang, Que Xirong. Delay-Aware Resource Scheduling Optimization in Network Function Virtualization[J]. Journal of Computer Research and Development, 2018, 55(4): 738-747. DOI: 10.7544/issn1000-1239.2018.20170926
    [8]Wang Junxiao, Qi Heng, Li Keqiu, Zhou Xiaobo. Real-Time Link Fault Detection as a Service for Datacenter Network[J]. Journal of Computer Research and Development, 2018, 55(4): 704-716. DOI: 10.7544/issn1000-1239.2018.20170941
    [9]Wang Yuwei, Liu Min, Ma Cheng, Li Pengfei. High Performance Load Balancing Mechanism for Network Function Virtualization[J]. Journal of Computer Research and Development, 2018, 55(4): 689-703. DOI: 10.7544/issn1000-1239.2018.20170923
    [10]Ma Jiuyue, Yu Zihao, Bao Yungang, Sun Ninghui. A Programmable Data Plane Design in Computer Architecture[J]. Journal of Computer Research and Development, 2017, 54(1): 123-133. DOI: 10.7544/issn1000-1239.2017.20160102

Catalog

    Article views (1530) PDF downloads (603) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return