Adaptive oblivious transfer with access control from lattice assumptions

نویسندگان

چکیده

Adaptive oblivious transfer (OT) is a protocol where sender initially commits to database {Mi}i=1N. Then, receiver can query the up k times with private indexes ρ1,…,ρk so as obtain Mρ1,…,Mρk and nothing else. Moreover, for each i∈[k], receiver's choice ρi may depend on previously obtained messages {Mρj}j<i. Oblivious access control (OT-AC) flavor of adaptive OT records are protected by distinct policies that specify which credentials should in order Mi. So far, all known OT-AC protocols only support made conjunctions or rely ad hoc assumptions pairing-friendly groups (or both). In this paper, we provide an consist any branching program polynomial length, sufficient realize policy NC1. The security our proved under Learning-with-Errors (LWE) Short-Integer-Solution (SIS) assumptions. As result independent interest, proving correct evaluation committed input.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive Oblivious Transfer with Access Control from Lattice Assumptions

Adaptive oblivious transfer (OT) is a protocol where a sender initially commits to a database {Mi}i=1. Then, a receiver can query the sender up to k times with private indexes ρ1, . . . , ρk so as to obtain Mρ1 , . . . ,Mρk and nothing else. Moreover, for each i ∈ [k], the receiver’s choice ρi may depend on previously obtained messages {Mρj}j<i. Oblivious transfer with access control (OT-AC) is...

متن کامل

Practical Adaptive Oblivious Transfer from Simple Assumptions

In an adaptive oblivious transfer (OT) protocol, a sender commits to a database of messages and then repeatedly interacts with a receiver in such a way that the receiver obtains one message per interaction of his choice (and nothing more) while the sender learns nothing about any of the choices. Recently, there has been significant effort to design practical adaptive OT schemes and to use these...

متن کامل

Oblivious Transfer with Hidden Access Control Policies

Consider a database where each record has different access control policies. These policies could be attributes, roles, or rights that the user needs to have in order to access the record. Here we provide a protocol that allows the users to access the database record while: (1) the database does not learn who queries a record; (2) the database does not learn which record is being queried, nor t...

متن کامل

Oblivious Transfer with Threshold Access Control

In this paper, we introduce the concept of oblivious transfer with threshold access control. Namely, for each message in a database, the server associates an attribute set τ with it such that the message can only be available, on request, to the users who possess at least t attributes out of τ. Meanwhile, after the server and users execute the protocol, the server will not learn anything about ...

متن کامل

Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption

The notion of oblivious transfer with hidden access control policies (HACOT) was recently proposed by Camenisch et al. (Public-Key Cryptography 2011). This primitive allows a user to anonymously query a database where each record is protected by a hidden attribute-based access control policy. At each query, the user either learns the value of a single record if the attributes in his key satisfy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical Computer Science

سال: 2021

ISSN: ['1879-2294', '0304-3975']

DOI: https://doi.org/10.1016/j.tcs.2021.09.001