• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao. An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol[J]. Journal of Computer Research and Development, 2017, 54(10): 2215-2223. DOI: 10.7544/issn1000-1239.2017.20170463
Citation: Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao. An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol[J]. Journal of Computer Research and Development, 2017, 54(10): 2215-2223. DOI: 10.7544/issn1000-1239.2017.20170463

An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol

More Information
  • Published Date: September 30, 2017
  • Oblivious transfer (OT) is a cryptographic primitive used for choice information hiding for the receiver. As a basic tool for high-level multi-party cryptographic protocol construction, it plays an important role in numerous specific applications. In the k-out-of-n OT(OT\+k\-n), the receiver acquires k selections among the n choice in an oblivious manner. Generally, the construction of the OT\+k\-n involves lots of group exponential operations, which brings a heavy burden for embedded devices with limited computational capabilities. With the proliferation of cloud computing, it is feasible to implement complex cryptographic primitives with the support of powerful computing recourse and high-speed dedicated network provided by the cloud service provider (CSP). In this paper, we propose a service-assisted k-out-of-n OT protocol in single server architecture, which outsources the vast majority of exponentiation operations to the cloud. This scheme is constructed with secret sharing and other fundamental public-key primitives, and it achieves provable security on none-collusion semi-honest model under the decisional Diffie-Hellamn (DDH) hard problem; meanwhile it ensures data privacy against the cloud server. Besides, a detailed description of scheme construction and security proof is presented in the context. As a basic cryptographic primitive in cloud environment, the single server-added oblivious transfer protocol will play an important role in designs of general cloud-assisted multi-party computation protocol as well as developments of secure and efficient cloud service software.
  • Related Articles

    [1]Liu Weixin, Guan Yewei, Huo Jiarong, Ding Yuanchao, Guo Hua, Li Bo. A Fast and Secure Transformer Inference Scheme with Secure Multi-Party Computation[J]. Journal of Computer Research and Development, 2024, 61(5): 1218-1229. DOI: 10.7544/issn1000-1239.202330966
    [2]Zhao Chuan, Xu Jun. Secure Multi-Party Computation Based on Cut-and-Choose Technology[J]. Journal of Computer Research and Development, 2022, 59(8): 1800-1818. DOI: 10.7544/issn1000-1239.20210664
    [3]Guo Juanjuan, Wang Qiongxiao, Xu Xin, Wang Tianyu, Lin Jingqiang. Secure Multiparty Computation and Application in Machine Learning[J]. Journal of Computer Research and Development, 2021, 58(10): 2163-2186. DOI: 10.7544/issn1000-1239.2021.20210626
    [4]Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin. A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290. DOI: 10.7544/issn1000-1239.2021.20200751
    [5]Feng Qi, He Debiao, Luo Min, Li Li. Efficient Two-Party SM2 Signing Protocol for Mobile Internet[J]. Journal of Computer Research and Development, 2020, 57(10): 2136-2146. DOI: 10.7544/issn1000-1239.2020.20200401
    [6]Jiang Han, Xu Qiuliang. Secure Multiparty Computation in Cloud Computing[J]. Journal of Computer Research and Development, 2016, 53(10): 2152-2162. DOI: 10.7544/issn1000-1239.2016.20160685
    [7]Jiang Han, Xu Qiuliang. Advances in Key Techniques of Practical Secure Multi-Party Computation[J]. Journal of Computer Research and Development, 2015, 52(10): 2247-2257. DOI: 10.7544/issn1000-1239.2015.20150763
    [8]Zhang En, Cai Yongquan. Rational Secure Two-Party Computation Protocol[J]. Journal of Computer Research and Development, 2013, 50(7): 1409-1417.
    [9]Wang Ke and Dai Yiqi. Secure Multiparty Computation of Statistical Distribution[J]. Journal of Computer Research and Development, 2010, 47(2): 201-206.
    [10]Li Shundong, Si Tiange, and Dai Yiqi. Secure Multi-Party Computation of Set-Inclusion and Graph-Inclusion[J]. Journal of Computer Research and Development, 2005, 42(10): 1647-1653.
  • Cited by

    Periodical cited type(33)

    1. 林雪燕. 云计算环境下的网络虚拟化与性能优化. 信息与电脑(理论版). 2024(05): 153-155 .
    2. 王雅倩,陈心怡,曲睿,周振宇. 基于SDN/NFV的电力物联网时延敏感业务编排方法. 华北电力大学学报(自然科学版). 2023(01): 84-91 .
    3. 施苏峰. 基于eBPF的虚拟化网络与云原生网络应用. 网络安全与数据治理. 2023(02): 9-18 .
    4. 鲜娅静. 基于NGN和5G的档案管理系统研究与仿真. 微型电脑应用. 2023(02): 161-163+168 .
    5. 阳勇,孟相如,康巧燕,陈港. 基于资源需求预测的动态服务功能链迁移方法. 计算机研究与发展. 2023(05): 1151-1163 . 本站查看
    6. 张子尧,吴黎兵,夏振厂,张壮壮. 一种SDN环境的SNMP Trap报文聚合方法. 小型微型计算机系统. 2023(09): 2059-2067 .
    7. 陶志勇,张锦,阳王东,唐铁斌. 面向虚拟私有网的网络设备虚拟化技术. 计算机系统应用. 2022(02): 137-142 .
    8. 祖家琛,胡谷雨,严佳洁,李实吉. 网络功能虚拟化下服务功能链的资源管理研究综述. 计算机研究与发展. 2021(01): 137-152 . 本站查看
    9. 郭胜,史久根,孙立,谢熠君. 基于VNF间性能干扰的服务请求调度策略. 计算机技术与发展. 2021(01): 142-148 .
    10. 王大鹏,宋文贵,吴波,刘希念,田际,周钰涛,赵晋松,杜保华,吴智群,褚贵宏. 基于私有云的发电企业一体化平台构建方案. 热力发电. 2021(05): 67-74 .
    11. 陈杨,刘作,黎聪,龙俊霖,赵群帅. 基于SDN与NFV的云通信软交换能力切片化部署稳定性研究. 通信技术. 2021(09): 2163-2168 .
    12. 马丁,费选,慕小武. 一种基于业务感知和可调节跳数的虚拟化层构建算法. 郑州大学学报(工学版). 2021(05): 50-55 .
    13. 高吉星,虞志刚,冯旭,陆洲. 面向空间网络的虚拟路由器实现方法. 中国电子科学研究院学报. 2021(09): 869-876 .
    14. 陶志勇,张锦,阳王东,陈为满. 基于双层虚拟思想的边缘设备性能优化研究. 计算机科学. 2021(11): 372-377 .
    15. 曹含笑,陈海浩,梁梅群,谢恩慧,韦晓慧. 轻量级容器化技术驱动的虚拟网络部署研究. 电子测试. 2020(06): 80-81+100 .
    16. 陈天殷,耿殿丽. 5G推进ADAS和自动驾驶发展进程. 客车技术与研究. 2020(02): 1-4 .
    17. 马卫国,郎为民,张寅,张汉. 虚拟化网络功能测量问题研究. 电信快报. 2020(03): 1-5 .
    18. 陈天殷,耿殿丽. 5G保证ADAS、自动驾驶系统安全可靠地运行. 汽车电器. 2020(07): 1-4 .
    19. 刘海鹏,周淑秋. 网络切片技术在矿山通信网络中的应用研究. 工矿自动化. 2020(08): 28-31+57 .
    20. 刘敏. 业务流的VNF动态资源分配研究与设计. 玉林师范学院学报. 2020(03): 108-114 .
    21. 贾海宇,陈佳,王铭鑫. 无线接入网络中网络功能虚拟化研究综述. 电信科学. 2019(01): 97-112 .
    22. 马润年,陈彤睿,王刚,伍维甲. 面向隔离区异构平台的动态防御主动迁移策略. 火力与指挥控制. 2019(03): 1-8+22 .
    23. 邓理,吴伟楠,朱正一,陈鸣. DiffSec:一种差别性的智能网络安全服务模型. 计算机研究与发展. 2019(05): 955-966 . 本站查看
    24. 付乔,张昊. 持续集成持续交付的NFV/SDN网络新型集成体系. 移动通信. 2019(07): 22-27 .
    25. 郎为民,张汉,赵毅丰,姚晋芳. 网络功能虚拟化技术研究. 电信快报. 2019(07): 1-5 .
    26. 黄远宏. 探讨网络虚拟化及网络功能虚拟化技术. 通讯世界. 2019(08): 120-121 .
    27. 李芬,熊雄. 数据中心网络虚拟化技术应用探析. 中国新通信. 2019(15): 85-86 .
    28. 郎为民,张汉,吴帆,姚晋芳. 网络功能虚拟化弹性和可扩展性研究. 电信快报. 2019(08): 1-5 .
    29. 郎为民,张汉,吴帆,姚晋芳. 虚拟化网络功能分解问题研究. 电信快报. 2019(09): 1-5+11 .
    30. 郎为民,张汉,吴帆,姚晋芳. 网络功能虚拟化基础设施研究. 电信快报. 2019(10): 1-6+23 .
    31. 伊鹏,谢记超,张震,谷允捷,赵丹. 抗侧信道攻击的服务功能链部署方法. 电子与信息学报. 2019(11): 2699-2707 .
    32. 夏洋,黄治华. 基于NFV和SDN的通信资源虚拟化及调度研究. 信息与电脑(理论版). 2018(17): 141-142 .
    33. 徐晓莉,张常亮,杨雪. 气象广域网双链路流量调度方法研究及实现. 电子测量技术. 2018(18): 36-41 .

    Other cited types(58)

Catalog

    Article views (1530) PDF downloads (603) Cited by(91)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return