Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chu, CK | en_US |
dc.contributor.author | Tzeng, WG | en_US |
dc.date.accessioned | 2014-12-08T15:36:43Z | - |
dc.date.available | 2014-12-08T15:36:43Z | - |
dc.date.issued | 2005 | en_US |
dc.identifier.isbn | 3-540-24454-9 | en_US |
dc.identifier.issn | 0302-9743 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/25066 | - |
dc.description.abstract | In this paper we propose efficient two-round k-out-of-n oblivious transfer schemes, in which R sends O(k) messages to S, and S sends 0(n) messages back to R. The computation cost of R and S is reasonable. The choices of R are unconditionally secure. For the basic scheme, the secrecy of unchosen messages is guaranteed. if the Decisional Diffie-Hellman problem is hard. When k = 1, our basic scheme is as efficient as the most efficient 1-out-of-n oblivious transfer scheme., Our schemes have the nice property of universal parameters, that is each pair of R and S need neither hold any secret key nor perform any prior setup (initialization). The system parameters can be used by all senders and receivers without any trapdoor specification. Our k-out-of-n oblivious transfer schemes are the most efficient ones in terms of the communication cost, in both rounds and the number of messages. Moreover, one of our schemes can be extended in a straightforwaxd way to an adaptive k-out-of-n oblivious transfer scheme, which allows the receiver R to choose the messages one by one adaptively. In our adaptivequery scheme, S sends O(n) messages to R in one round in the commitment phase. For each query of R, only O(1) messages are exchanged and O(1) operations axe performed. In fact, the number k of queries need not be pre-fixed or known beforehand. This makes our scheme highly flexible. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | k-out-of-n oblivious transfer | en_US |
dc.subject | adaptive oblivious transfer | en_US |
dc.title | Efficient k-out-of-n oblivious transfer schemes. with adaptive and non-adaptive queries | en_US |
dc.type | Article; Proceedings Paper | en_US |
dc.identifier.journal | PUBLIC KEY CRYPTOGRAPHY - PKC 2005 | en_US |
dc.citation.volume | 3386 | en_US |
dc.citation.spage | 172 | en_US |
dc.citation.epage | 183 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000227984700012 | - |
Appears in Collections: | Conferences Paper |