An efficient t‐out‐of‐n oblivious transfer for information security and privacy protection |
| |
Authors: | Der‐Chyuan Lou Hui‐Feng Huang |
| |
Affiliation: | 1. Department of Computer Science and Information Engineering, Chang Gung University, Kweishan, Taoyuan, Taiwan;2. Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan |
| |
Abstract: | In t‐out‐of‐n oblivious transfer (OT), the receiver can only receive t messages out of n messages sent by the sender, and the sender has no idea about which ones have been received. Majority of the existence of previous efficient OT schemes require t calls of 1‐out‐of‐n OT to construct the t‐out‐of‐n OT. Its computational requirements and bandwidth consumption are quite demanding. On the basis of the elliptic curves cryptography, we propose a new t‐out‐of‐n OT protocol for private information retrieval in this article. It is more suitable for the smart cards or mobile units. Copyright © 2013 John Wiley & Sons, Ltd. |
| |
Keywords: | private information retrieval security ECC oblivious transfer cloud |
|
|