Several Oblivious Transfer Variants in Cut-and-Choose Scenario
Chuan Zhao,
Han Jiang,
Qiuliang Xu,
Xiaochao Wei and
Hao Wang
Additional contact information
Chuan Zhao: School of Computer Science and Technology, Shandong University, Jinan, China
Han Jiang: School of Computer Science and Technology, Shandong University, Jinan, China
Qiuliang Xu: School of Computer Science and Technology, Shandong University, Jinan, China
Xiaochao Wei: School of Computer Science and Technology, Shandong University, Jinan, China
Hao Wang: School of Computer Science and Technology, Shandong University, Jinan, China
International Journal of Information Security and Privacy (IJISP), 2015, vol. 9, issue 2, 1-12
Abstract:
Oblivious transfer is a fundamental tool in modern cryptography. In the past few years, many studies concentrate on oblivious transfer variants with more powerful functions. In this paper, the authors propose several variants of oblivious transfer in cut-and-choose scenario, providing multiple ways of transferring data in an oblivious manner. In addition, based on homomorphic encryption, the authors construct instantiations of these primitives, which can be proven secure in malicious model under ideal/real simulation paradigm and achieve the highest security level in the real world.
Date: 2015
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJISP.2015040101 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jisp00:v:9:y:2015:i:2:p:1-12
Access Statistics for this article
International Journal of Information Security and Privacy (IJISP) is currently edited by Yassine Maleh
More articles in International Journal of Information Security and Privacy (IJISP) from IGI Global
Bibliographic data for series maintained by Journal Editor ().