An Efficient Accountable Oblivious Transfer With Access Control Scheme in the Public Cloud

An Efficient Accountable Oblivious Transfer With Access Control Scheme in the Public Cloud

Xin Liu, Bin Zhang
Copyright: © 2022 |Volume: 16 |Issue: 1 |Pages: 24
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781683180203|DOI: 10.4018/IJISP.297030
Cite Article Cite Article

MLA

Liu, Xin, and Bin Zhang. "An Efficient Accountable Oblivious Transfer With Access Control Scheme in the Public Cloud." IJISP vol.16, no.1 2022: pp.1-24. http://doi.org/10.4018/IJISP.297030

APA

Liu, X. & Zhang, B. (2022). An Efficient Accountable Oblivious Transfer With Access Control Scheme in the Public Cloud. International Journal of Information Security and Privacy (IJISP), 16(1), 1-24. http://doi.org/10.4018/IJISP.297030

Chicago

Liu, Xin, and Bin Zhang. "An Efficient Accountable Oblivious Transfer With Access Control Scheme in the Public Cloud," International Journal of Information Security and Privacy (IJISP) 16, no.1: 1-24. http://doi.org/10.4018/IJISP.297030

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In an oblivious transfer with access control (AC-OT) scheme, the database provider (DBP) can define different access control policies for each data record, and users are allowed to hide their choices from the DBP when accessing data. An accountable AC-OT (AAC-OT) scheme is an enhanced version of AC-OT that allows the DBP to revoke the access rights of malicious users. However, existing AAC-OT schemes have defects in their security model definition, malicious user revocation mechanism, and user-side performance. Therefore, the authors proposed an improved AAC-OT scheme that applies to the public cloud environment. In the definition of the security model, the definitions of access authorization and revocation are considered. By modifying the user tracing mechanism, the DBP can independently revoke the access rights of fraudulent users. In addition, the number of bilinear pairing operations performed by users in the transfer phase is kept constant by optimizing the generation of the underlying zero-knowledge proofs.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.