Verifiable oblivious transfer protocol

Narn Yih Lee, Chien Chih Wang

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

The Oblivious Transfer (OT), introduced by Rabin in 1981, has become an important and fundamental cryptography technique. An OT protocol should have two important characteristics: the sender's privacy and the chooser's privacy. The sender is a party who will deliver a secret to the chooser. The chooser is another party who acts as receiver to learn some information about the input from the sender. The chooser learns of certain information concerning the sender's input while the sender is not allowed to know what the chooser has learned. Moreover, the chooser cannot acquire any messages that he/she did not choose. Naor and Pinkas have recently proposed an efficient oblivious transfer protocol (EOT) that implementes 1-out-of-n protocol, but this EOT has a flaw: it cannot withstand "the same message attack." In this paper, we will improve Naor and Pinkas EOT and make it resistant to "the same message attack."

Original languageEnglish
Pages (from-to)2890-2892
Number of pages3
JournalIEICE Transactions on Information and Systems
VolumeE88-D
Issue number12
DOIs
Publication statusPublished - 2005 Dec

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Verifiable oblivious transfer protocol'. Together they form a unique fingerprint.

Cite this