Title :
The Essential Design Principles of Verifiable Non-interactive OT Protocols
Author :
Chang, Ya-Fen ; Shiao, Wei-Cheng
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Nat. Taichung Inst. of Technol., Taichung
Abstract :
OT (oblivious transfer) is an important e-commerce technique to make information buyers be able to get desired information and preserve privacy at the sametime. Recently, Kim et al. proposed two 1-out-of-2 NIOT (non-interactive OT) schemes. They claimed the message sender can be verified in their schemes. Unfortunately, their schemes are insecure. In this paper, we will make thorough discussions on the design principles of secure verifiable NIOT schemes.
Keywords :
data privacy; electronic commerce; message authentication; protocols; public key cryptography; ElGamal cryptography; RSA cryptography; assymetric encryption; e-commerce; information buyers; message sender verification; privacy preservation; public key cryptography; verifiable noninteractive oblivious transfer protocols; Application software; Computer science; Design engineering; Information security; Information technology; Intelligent systems; Privacy; Protocols; Public key cryptography; ElGamal; non-interactive; oblivious transfer; security;
Conference_Titel :
Intelligent Systems Design and Applications, 2008. ISDA '08. Eighth International Conference on
Conference_Location :
Kaohsiung
Print_ISBN :
978-0-7695-3382-7
DOI :
10.1109/ISDA.2008.94