Volume 16, Issue 3 (2016)                   MJEE 2016, 16(3): 29-32 | Back to browse issues page

XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Jaberi M, Mala H. Protocols for Authenticated Oblivious Transfer. MJEE 2016; 16 (3) :29-32
URL: http://mjee.modares.ac.ir/article-17-1956-en.html
1- University of Isfahan
Abstract:   (4296 Views)
Oblivious transfer (OT) is a basic building block in many cryptographic protocols. A common approach in designing secure multiparty computation protocols is to assume that messages of the protocol are being transmitted over an authenticated channel, where entities have been authenticated to each other before the actual flows of the protocol. However, the mentioned aspect leads to some restrictions in design and development of secure multiparty computations. In this paper, we exploit some well-known authenticated Diffie-Hellman-based key exchange protocols to build three authenticated 1-out-of-2 oblivious transfer protocols. As a result, our schemes incorporate the authentication within the oblivious transfer protocol itself, instead of performing authentication via a separate sub-protocol. We show that the proposed protocols are secure in the semi-honest model. We also compare our new schemes with the previous methods (performing authentication via a separate sub-protocol) which illustrates that our schemes decrease computational and communication complexity for both sender and receiver.
Full-Text [PDF 594 kb]   (2172 Downloads)    
Article Type: Full Research Paper | Subject: پروتکلهای امنیتی
Received: 2016/08/12 | Accepted: 2016/10/1 | Published: 2017/01/24

Add your comments about this article : Your username or Email:
CAPTCHA

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.