Adaptive oblivious transfer with access control from lattice assumptions
نویسندگان
چکیده
Adaptive oblivious transfer (OT) is a protocol where sender initially commits to database {Mi}i=1N. Then, receiver can query the up k times with private indexes ρ1,…,ρk so as obtain Mρ1,…,Mρk and nothing else. Moreover, for each i∈[k], receiver's choice ρi may depend on previously obtained messages {Mρj}j<i. Oblivious access control (OT-AC) flavor of adaptive OT records are protected by distinct policies that specify which credentials should in order Mi. So far, all known OT-AC protocols only support made conjunctions or rely ad hoc assumptions pairing-friendly groups (or both). In this paper, we provide an consist any branching program polynomial length, sufficient realize policy NC1. The security our proved under Learning-with-Errors (LWE) Short-Integer-Solution (SIS) assumptions. As result independent interest, proving correct evaluation committed input.
منابع مشابه
Adaptive Oblivious Transfer with Access Control from Lattice Assumptions
Adaptive oblivious transfer (OT) is a protocol where a sender initially commits to a database {Mi}i=1. Then, a receiver can query the sender up to k times with private indexes ρ1, . . . , ρk so as to obtain Mρ1 , . . . ,Mρk and nothing else. Moreover, for each i ∈ [k], the receiver’s choice ρi may depend on previously obtained messages {Mρj}j<i. Oblivious transfer with access control (OT-AC) is...
متن کاملPractical Adaptive Oblivious Transfer from Simple Assumptions
In an adaptive oblivious transfer (OT) protocol, a sender commits to a database of messages and then repeatedly interacts with a receiver in such a way that the receiver obtains one message per interaction of his choice (and nothing more) while the sender learns nothing about any of the choices. Recently, there has been significant effort to design practical adaptive OT schemes and to use these...
متن کاملOblivious Transfer with Hidden Access Control Policies
Consider a database where each record has different access control policies. These policies could be attributes, roles, or rights that the user needs to have in order to access the record. Here we provide a protocol that allows the users to access the database record while: (1) the database does not learn who queries a record; (2) the database does not learn which record is being queried, nor t...
متن کاملOblivious Transfer with Threshold Access Control
In this paper, we introduce the concept of oblivious transfer with threshold access control. Namely, for each message in a database, the server associates an attribute set τ with it such that the message can only be available, on request, to the users who possess at least t attributes out of τ. Meanwhile, after the server and users execute the protocol, the server will not learn anything about ...
متن کاملOblivious Transfer with Hidden Access Control from Attribute-Based Encryption
The notion of oblivious transfer with hidden access control policies (HACOT) was recently proposed by Camenisch et al. (Public-Key Cryptography 2011). This primitive allows a user to anonymously query a database where each record is protected by a hidden attribute-based access control policy. At each query, the user either learns the value of a single record if the attributes in his key satisfy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theoretical Computer Science
سال: 2021
ISSN: ['1879-2294', '0304-3975']
DOI: https://doi.org/10.1016/j.tcs.2021.09.001