An efficient t-out-of-n oblivious transfer for information security and privacy protection

Der Chyuan Lou, Hui Feng Huang*

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

8 Scopus citations

Abstract

In t-out-of-n oblivious transfer (OT), the receiver can only receive t messages out of n messages sent by the sender, and the sender has no idea about which ones have been received. Majority of the existence of previous efficient OT schemes require t calls of 1-out-of-n OT to construct the t-out-of-n OT. Its computational requirements and bandwidth consumption are quite demanding. On the basis of the elliptic curves cryptography, we propose a new t-out-of-n OT protocol for private information retrieval in this article. It is more suitable for the smart cards or mobile units.

Original languageEnglish
Pages (from-to)3759-3767
Number of pages9
JournalInternational Journal of Communication Systems
Volume27
Issue number12
DOIs
StatePublished - 01 12 2014

Bibliographical note

Publisher Copyright:
Copyright © 2013 John Wiley & Sons, Ltd.

Keywords

  • Cloud
  • ECC
  • Oblivious transfer
  • Private information retrieval
  • Security

Fingerprint

Dive into the research topics of 'An efficient t-out-of-n oblivious transfer for information security and privacy protection'. Together they form a unique fingerprint.

Cite this