Back close

A Fully Simulatable Oblivios Transfer Scheme using Vector Decomposition

Publisher : International Conference on Intelligent computing, Communication and Devices (ICCD-2014), Advances in Intelligent Systems and Computing

Campus : Coimbatore

Center : TIFAC CORE in Cyber Security

Verified : Yes

Year : 2014

Abstract : Oblivious transfer is one of the most basic and widely used protocol primitives in cryptography. It can be described as a two-party protocol used for interaction between a sender and a receiver. A 1-out-of-2 oblivious transfer is the interaction between a sender and a receiver in which a sender has two strings m 0 and m 1. At the end of the interaction, receiver learns exactly one of the strings m 0 and m 1, while the sender learns nothing. Lindell showed how to achieve efficient and fully simulatable non-adaptive oblivious transfer under decisional Diffie–Hellman (DDH) problem, Nth residuosity and quadratic residuosity assumptions, as well as the assumption that homomorphic encryption exists. We propose a scheme based on this protocol under the assumption namely vector decomposition problem. Our scheme is non-adaptive and fully simulatable.

Admissions Apply Now