Oblivious Transfer with Threshold Access Control?
Saved in:
| Title: | Oblivious Transfer with Threshold Access Control? |
|---|---|
| Authors: | Lingling Xu, Fangguo Zhang |
| Contributors: | The Pennsylvania State University CiteSeerX Archives |
| Source: | http://journal.iis.sinica.edu.tw/paper/1/100145-3.pdf?cd%3D2638D26B11F30C741. |
| Collection: | CiteSeerX |
| Subject Terms: | Oblivious Transfer, Threshold Access Control, Fuzzy Identity-Based Encryption, Cre- dential Signature |
| Description: | In this paper, we introduce the concept of oblivious transfer with threshold access control. Namely, for each message in a database, the server associates an attribute set τ with it such that the message can only be available, on request, to the users who possess at least t attributes out of τ. Meanwhile, after the server and users execute the protocol, the server will not learn anything about the identities, attributes or message choices of the users. The essential idea of “threshold ” access control is to define the minimum number of attributes from a given set of attributes that users have to possess in order to obtain the message. Combining Sahai and Waters ’ fuzzy identity-based encryption with a credential signature scheme, we present a concrete construction for the oblivious transfer with threshold access control which is proved secure in the standard model. |
| Document Type: | text |
| File Description: | application/pdf |
| Language: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.672.6765 |
| Availability: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.672.6765 http://journal.iis.sinica.edu.tw/paper/1/100145-3.pdf?cd%3D2638D26B11F30C741 |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Accession Number: | edsbas.E75064B4 |
| Database: | BASE |
| Abstract: | In this paper, we introduce the concept of oblivious transfer with threshold access control. Namely, for each message in a database, the server associates an attribute set τ with it such that the message can only be available, on request, to the users who possess at least t attributes out of τ. Meanwhile, after the server and users execute the protocol, the server will not learn anything about the identities, attributes or message choices of the users. The essential idea of “threshold ” access control is to define the minimum number of attributes from a given set of attributes that users have to possess in order to obtain the message. Combining Sahai and Waters ’ fuzzy identity-based encryption with a credential signature scheme, we present a concrete construction for the oblivious transfer with threshold access control which is proved secure in the standard model. |
|---|
Nájsť tento článok vo Web of Science