loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Vandana Guleria and Ratna Dutta

Affiliation: Indian Institute of Technology Kharagpur, India

ISBN: 978-989-758-045-1

Keyword(s): Oblivious Transfer, Access Policy, Attribute based Encryption, Full Simulation Security Model.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Databases and Data Security ; Information and Systems Security

Abstract: We propose an efficient adaptive oblivious transfer protocol with hidden access policies. This scheme allows a receiver to anonymously recover a message from a database which is protected by hidden attribute based access policy if the receiver’s attribute set satisfies the associated access policy implicitly. The proposed scheme is secure in the presence of malicious adversary under the q-Strong Diffie-Hellman (SDH), q-Power Decisional Diffie-Hellman (PDDH) and Decision Bilinear Diffie-Hellman (DBDH) assumption in full-simulation security model. The scheme covers disjunction of attributes. The proposed protocol outperforms the existing similar schemes in terms of both communication and computation.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.204.194.190

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Guleria, V. and Dutta, R. (2014). Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction.In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, pages 43-54. DOI: 10.5220/0005016900430054

@conference{secrypt14,
author={Vandana Guleria. and Ratna Dutta.},
title={Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={43-54},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005016900430054},
isbn={978-989-758-045-1},
}

TY - CONF

JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction
SN - 978-989-758-045-1
AU - Guleria, V.
AU - Dutta, R.
PY - 2014
SP - 43
EP - 54
DO - 10.5220/0005016900430054

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.