An Efficient Oblivious Transfer Protocol with Access Control
Title | An Efficient Oblivious Transfer Protocol with Access Control |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Liao, Y., Zhou, J., Yang, Y., Ruan, O. |
Conference Name | 2018 13th Asia Joint Conference on Information Security (AsiaJCIS) |
ISBN Number | 978-1-5386-7380-5 |
Keywords | Access Control, access control policy, anonymous access, anonymous messaging, Asia, authorisation, cryptographic protocols, data privacy, efficient oblivious transfer protocol, Elliptic curve cryptography, illegal user access, Oblivious transfer, OTAC, privacy, privacy-preserving database, pubcrawl, public key cryptography, resilience, Resiliency, Scalability |
Abstract | Due to the rapid development of internet in our daily life, protecting privacy has become a focus of attention. To create privacy-preserving database and prevent illegal user access the database, oblivious transfer with access control (OTAC) was proposed, which is a cryptographic primitive that extends from oblivious transfer (OT). It allows a user to anonymously query a database where each message is protected by an access control policy and only if the user' s attribute satisfy that access control policy can obtain it. In this paper, we propose a new protocol for OTAC by using elliptic curve cryptography, which is more efficient compared to the existing similar protocols. In our scheme, we also preserves user's anonymity and ensures that the user's attribute is not disclosed to the sender. Additionally, our construction guarantees the user to verify the correctness of messages recovered at the end of each transfer phase. |
URL | https://ieeexplore.ieee.org/document/8453758 |
DOI | 10.1109/AsiaJCIS.2018.00014 |
Citation Key | liaoEfficientObliviousTransfer2018 |
- illegal user access
- Scalability
- Resiliency
- resilience
- public key cryptography
- pubcrawl
- privacy-preserving database
- privacy
- OTAC
- Oblivious transfer
- Access Control
- Elliptic curve cryptography
- efficient oblivious transfer protocol
- data privacy
- Cryptographic Protocols
- authorisation
- Asia
- anonymous messaging
- anonymous access
- access control policy