帶有基于RSA簽名的接入控制的不經(jīng)意傳輸協(xié)議
Oblivious Transfer Protocol with RSA-Based Access Control
-
摘要: 該文在RSA簽名及關(guān)于數(shù)據(jù)串的不經(jīng)意傳輸?shù)幕A(chǔ)上提出了一種增強(qiáng)的不經(jīng)意傳輸協(xié)議,解決了一種不經(jīng)意傳輸?shù)慕尤肟刂茊?wèn)題。除了具備一般不經(jīng)意傳輸協(xié)議的特征外,該方案具有如下特點(diǎn):只有持有權(quán)威機(jī)構(gòu)發(fā)放的簽字的接收者才能打開(kāi)密文而且發(fā)送者不能確定接收者是否持有簽字,即不能確定接受者的身份。在DDH假設(shè)和隨機(jī)預(yù)言模型下該方案具有可證明的安全性。該方案使用標(biāo)準(zhǔn)RSA簽名及Elgamal加密。Abstract: Based on RSA signature and (string) oblivious transfer, an oblivious transfer protocol is proposed which solved the access control problem for an oblivious transfer protocol. The protocol proposed has the property: the only receiver who has the signature issued by the central authority can open the message which he chose; the sender can not decide whether the receiver has the signature or not. That is the identity of the receiver can not be confirmed after the protocol. Under the Decisional Diffie-Hellman(DDH) assumption the proposed scheme has provable security. The proposed scheme employs the standard RSA signature and Elgamal encryption.
-
Rabin M. How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard Univ., 1981.[2]Li Ninghui, Du Wenliang, Boneh Dan. Oblivious signature-based envelope[A]. In Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003)[C], Boston, Massachusetts, ACM Press, New York, July 2003:182-189.[3]Rivest R L, Shamir A, Adleman L M. A method for obtaining digital signatures and public key cryptosystems[J].Communications of the ACM.1978, 21(2):120-126[4]Tobias Christian. Practical oblivious transfer protocols. [A]. 5th International Workshop on Information Hiding(IH 2002)[C]. Springer Verlag, LNCS 2578,Noordwijkerhout, The Netherlands, October 2002:415-426.[5]Ateniese G. Verifiable encryption of digital signatures and applications[J].ACM Transactions on Information and System Security.2004,7(1):1-20[6]ElGamal T. A Public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Trans. Information Theory.1985, 31(4):469-472[7]Tsiounis Y, Yung M. On the security of ElGamal-based encryption[A]. Proc. of PKC '98[C]. Springer Verlag, LNCS 1431, Yokohama, Japan, 1998: 117-134.[8]Aiello B.[J].Ishai Y, Reingold O. Priced oblivious transfer: How to sell digital goods[A]. Proc. Advances in Cryptology (Eurocrypt01)[C]. Springer Verlag, LNCS 2045, Innsbruck, Austria.2001,:- -
計(jì)量
- 文章訪問(wèn)數(shù): 2292
- HTML全文瀏覽量: 100
- PDF下載量: 944
- 被引次數(shù): 0