Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tzeng, WG | en_US |
dc.date.accessioned | 2014-12-08T15:39:37Z | - |
dc.date.available | 2014-12-08T15:39:37Z | - |
dc.date.issued | 2004-02-01 | en_US |
dc.identifier.issn | 0018-9340 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/TC.2004.1261831 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/27052 | - |
dc.description.abstract | In this paper, we propose efficient and secure (string) oblivious transfer (OT(n)(1)) schemes for any n greater than or equal to 2. We build our OT(n)(1) scheme from fundamental cryptographic techniques directly. The receiver's choice is unconditionally secure and the secrecy of the unchosen secrets is based on the hardness of the decisional Diffie-Hellman problem. Some schemes achieve optimal efficiency in terms of the number of rounds and the total number of exchanged messages for the case that the receiver's choice is unconditionally secure. The distinct feature of our scheme is that the system-wide parameters are independent of n and universally usable, that is, all possible receivers and senders use the same parameters and need no trapdoors specific to each of them. We extend our OT(n)(1) schemes to distributed oblivious transfer schemes. Our distributed OT(n)(1) schemes take full advantage of the research results of secret sharing. For applications, we present a method of transforming any (single-database) PIR protocol into a symmetric PIR protocol by slightly increasing the communication cost only. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | oblivious transfer | en_US |
dc.subject | distributed oblivious transfer | en_US |
dc.subject | private information retrieval | en_US |
dc.title | Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/TC.2004.1261831 | en_US |
dc.identifier.journal | IEEE TRANSACTIONS ON COMPUTERS | en_US |
dc.citation.volume | 53 | en_US |
dc.citation.issue | 2 | en_US |
dc.citation.spage | 232 | en_US |
dc.citation.epage | 240 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000188196400010 | - |
dc.citation.woscount | 28 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.