Abstract
In t-out-of-n oblivious transfer (OT), the receiver can only receive t messages out of n messages sent by the sender, and the sender has no idea about which ones have been received. Majority of the existence of previous efficient OT schemes require t calls of 1-out-of-n OT to construct the t-out-of-n OT. Its computational requirements and bandwidth consumption are quite demanding. On the basis of the elliptic curves cryptography, we propose a new t-out-of-n OT protocol for private information retrieval in this article. It is more suitable for the smart cards or mobile units.
Original language | English |
---|---|
Pages (from-to) | 3759-3767 |
Number of pages | 9 |
Journal | International Journal of Communication Systems |
Volume | 27 |
Issue number | 12 |
DOIs | |
State | Published - 01 12 2014 |
Bibliographical note
Publisher Copyright:Copyright © 2013 John Wiley & Sons, Ltd.
Keywords
- Cloud
- ECC
- Oblivious transfer
- Private information retrieval
- Security