Oblivious Transfer with Threshold Access Control?

Saved in:
Bibliographic Details
Title: Oblivious Transfer with Threshold Access Control?
Authors: Lingling Xu, Fangguo Zhang
Contributors: The Pennsylvania State University CiteSeerX Archives
Source: http://journal.iis.sinica.edu.tw/paper/1/100145-3.pdf?cd%3D2638D26B11F30C741.
Collection: CiteSeerX
Subject Terms: Oblivious Transfer, Threshold Access Control, Fuzzy Identity-Based Encryption, Cre- dential Signature
Description: In this paper, we introduce the concept of oblivious transfer with threshold access control. Namely, for each message in a database, the server associates an attribute set τ with it such that the message can only be available, on request, to the users who possess at least t attributes out of τ. Meanwhile, after the server and users execute the protocol, the server will not learn anything about the identities, attributes or message choices of the users. The essential idea of “threshold ” access control is to define the minimum number of attributes from a given set of attributes that users have to possess in order to obtain the message. Combining Sahai and Waters ’ fuzzy identity-based encryption with a credential signature scheme, we present a concrete construction for the oblivious transfer with threshold access control which is proved secure in the standard model.
Document Type: text
File Description: application/pdf
Language: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.672.6765
Availability: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.672.6765
http://journal.iis.sinica.edu.tw/paper/1/100145-3.pdf?cd%3D2638D26B11F30C741
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Accession Number: edsbas.E75064B4
Database: BASE
Description
Abstract:In this paper, we introduce the concept of oblivious transfer with threshold access control. Namely, for each message in a database, the server associates an attribute set τ with it such that the message can only be available, on request, to the users who possess at least t attributes out of τ. Meanwhile, after the server and users execute the protocol, the server will not learn anything about the identities, attributes or message choices of the users. The essential idea of “threshold ” access control is to define the minimum number of attributes from a given set of attributes that users have to possess in order to obtain the message. Combining Sahai and Waters ’ fuzzy identity-based encryption with a credential signature scheme, we present a concrete construction for the oblivious transfer with threshold access control which is proved secure in the standard model.