UC Secure Issuer-Free Adaptive Oblivious Transfer with Hidden Access Policy

11/29/2017
by   Vandana Guleria, et al.
0

Privacy is a major concern in designing any cryptographic primitive when frequent transactions are done electronically. During electronic transactions, people reveal their personal data into several servers and believe that this information does not leak too much about them. The adaptive oblivious transfer with hidden access policy (AOT-HAP) takes measure against such privacy issues. The existing AOT-HAP involves a sender and multiple receivers apart from a designated issuer. Security of these schemes rely on the fact that the issuer cannot collude with a set of receivers. Moreover, they loose security when run with multiple protocol instances during concurrent execution. We present the first issuer-free AOT-HAP in universal composable (UC) framework in which the protocol is secure even when composed with each other or with other protocols. A concrete security analysis is given assuming the hardness of q-strong Diffie-Hellman (SDH), decision Linear (DLIN) and decision bilinear Diffie-Hellman (DBDH) problems against malicious adversary in UC model. Moreover, the protocol outperforms the existing similar schemes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/29/2019

Secure Exchange of Digital Goods in a Decentralized Data Marketplace

We are tackling the problem of trading real-world private information us...
research
05/17/2018

Supersingular Isogeny Oblivious Transfer

We present an oblivious transfer (OT) protocol that combines the OT sche...
research
11/18/2019

Secure Quantum Extraction Protocols

Knowledge extraction, typically studied in the classical setting, is at ...
research
09/09/2022

Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone

Oblivious Transfer (OT) is a major primitive for secure multiparty compu...
research
05/31/2019

Secure Memory Erasure in the Presence of Man-in-the-Middle Attackers

Memory erasure protocols serve to clean up a device's memory before the ...
research
02/15/2023

Exploring the Techniques of Information Security Certification

If the information system is intruded or attacked by hackers, leaked per...
research
10/18/2019

Universal Composability is Secure Compilation

Universal composability is a framework for the specification and analysi...

Please sign up or login with your details

Forgot password? Click here to reset