首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Two t-out-of-n Oblivious Transfer Schemes with Designated Receiver
作者姓名:ZHANG  Jianhong  ZOU  Wei
作者单位:[1]College of Science, North China University of Technology, Beijing 100041, China [2]Institute of Software of Chinese Academy of Sciences/State Key Laboratory of Information Security, Beijing 100080, China
基金项目:Supported by Scientific Research Common Program of Beijing Municipal Commission of Education (KM200610009011) and 0pen Fund of State Key Laboratory of Information Security (Institute of Software of Chinese Academy of Sciences) (02-4)
摘    要:Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n + 2t + 1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n + 3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable.

关 键 词:忘却迁移  指定检验  效率  密码术
文章编号:1007-1202(2006)06-1903-04
收稿时间:2006-03-20

Twot-out-of-n oblivious transfer schemes with designated receiver
ZHANG Jianhong ZOU Wei.Two t-out-of-n Oblivious Transfer Schemes with Designated Receiver[J].Wuhan University Journal of Natural Sciences,2006,11(6):1903-1906.
Authors:Zhang Jianhong  Zou Wei
Institution:(1) College of Science, North China University of Technology, 100041 Beijing, China;(2) State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Sciences, 100080 Beijing, China
Abstract:Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n+2t+1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n+3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable.
Keywords:oblivious transfer  designated verifier  efficiency
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号