首页 | 本学科首页   官方微博 | 高级检索  
     


An efficient t‐out‐of‐n oblivious transfer for information security and privacy protection
Authors:Der‐Chyuan Lou  Hui‐Feng Huang
Affiliation:1. Department of Computer Science and Information Engineering, Chang Gung University, Kweishan, Taoyuan, Taiwan;2. Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan
Abstract:In t‐out‐of‐n oblivious transfer (OT), the receiver can only receive t messages out of n messages sent by the sender, and the sender has no idea about which ones have been received. Majority of the existence of previous efficient OT schemes require t calls of 1‐out‐of‐n OT to construct the t‐out‐of‐n OT. Its computational requirements and bandwidth consumption are quite demanding. On the basis of the elliptic curves cryptography, we propose a new t‐out‐of‐n OT protocol for private information retrieval in this article. It is more suitable for the smart cards or mobile units. Copyright © 2013 John Wiley & Sons, Ltd.
Keywords:private information retrieval  security  ECC  oblivious transfer  cloud
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号