Reference Hub1
Several Oblivious Transfer Variants in Cut-and-Choose Scenario

Several Oblivious Transfer Variants in Cut-and-Choose Scenario

Chuan Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei, Hao Wang
Copyright: © 2015 |Volume: 9 |Issue: 2 |Pages: 12
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466676367|DOI: 10.4018/IJISP.2015040101
Cite Article Cite Article

MLA

Zhao, Chuan, et al. "Several Oblivious Transfer Variants in Cut-and-Choose Scenario." IJISP vol.9, no.2 2015: pp.1-12. http://doi.org/10.4018/IJISP.2015040101

APA

Zhao, C., Jiang, H., Xu, Q., Wei, X., & Wang, H. (2015). Several Oblivious Transfer Variants in Cut-and-Choose Scenario. International Journal of Information Security and Privacy (IJISP), 9(2), 1-12. http://doi.org/10.4018/IJISP.2015040101

Chicago

Zhao, Chuan, et al. "Several Oblivious Transfer Variants in Cut-and-Choose Scenario," International Journal of Information Security and Privacy (IJISP) 9, no.2: 1-12. http://doi.org/10.4018/IJISP.2015040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Oblivious transfer is a fundamental tool in modern cryptography. In the past few years, many studies concentrate on oblivious transfer variants with more powerful functions. In this paper, the authors propose several variants of oblivious transfer in cut-and-choose scenario, providing multiple ways of transferring data in an oblivious manner. In addition, based on homomorphic encryption, the authors construct instantiations of these primitives, which can be proven secure in malicious model under ideal/real simulation paradigm and achieve the highest security level in the real world.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.