Abstract
In the m-out-of-n oblivious transfer model, Alice has n messages, Bob has m choices. After the interaction between the two parties, Bob can get m but only m messages from the n messages, Alice cannot know which m messages Bob gets. In this paper, for the first time, we construct a m-out-of-n OT protocol based on the general secure public key system.
This work is partially supported by a grant from the Ministry of Science and Technology (#2001CCA03000), National Natural Science Fund (#60273045) and Shanghai Science and Technology Development Fund (#03JC14014).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aiello, B., Ishai, Y., Reingold, O.: Priced Oblivious Transfer: How to Sell Digital Goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 119–135. Springer, Heidelberg (2001)
Crépeau, C., Van de Graaf, J., Tapp, A.: Committed Oblivious Transfer and Private Multi-party Computations. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 110–123. Springer, Heidelberg (1995)
Cormen, H., Leiserson, E., Rivest, L., Stein, C.: Introduction to Algorithms, 2nd edn. MIT Press, Cambridge (2001)
Even, S., Goldreich, O., Lempel, A.: A Randomized Protocol for Signing Contracts. Commu. of the ACM 28, 637–647 (1995)
Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game or a Completeness Theorem for Protocols with Honest Majority. In: Proc. 19th Annu. ACM Symp. on Theo. of Compu., pp. 218–229 (1987)
Kilian, J.: Founding Cryptography on Oblivious Transfer. In: Proc. 20th Annu. ACM Symp. on Theo. of Compu., pp. 20–31 (1988)
Mu, Y., Zhang, J., Varadharajan, V.: m out of n Oblivious Transfer. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 395–405. Springer, Heidelberg (2002)
Naor, M., Pinkas, B.: Oblivious Transfer with Adaptive Queries. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 573–590. Springer, Heidelberg (1999)
Naor, M., Pinkas, B.: Efficient Oblivious Transfer Protocols. In: 12th Annu. Symp. On Disc. Algo., pp. 448–457 (2001)
Rabin, M.: How to Exchange Secrets by Oblivious Transfer. Tech. Repo. TR81, Aiken Comp. Lab, Harvard University (1981)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, Z., Zhu, H. (2004). General Public Key m-Out-of-n Oblivious Transfer. In: Zhang, J., He, JH., Fu, Y. (eds) Computational and Information Science. CIS 2004. Lecture Notes in Computer Science, vol 3314. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30497-5_137
Download citation
DOI: https://doi.org/10.1007/978-3-540-30497-5_137
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24127-0
Online ISBN: 978-3-540-30497-5
eBook Packages: Computer ScienceComputer Science (R0)