Oblivious Transfer with Access Control : Realizing Disjunction without Duplication

نویسندگان

  • Ye Zhang
  • Man Ho Au
  • Duncan S. Wong
  • Qiong Huang
  • Nikos Mamoulis
  • David Wai-Lok Cheung
  • Siu-Ming Yiu
چکیده

Oblivious Transfer with Access Control (AC-OT) is a protocol which allows a user to obtain a database record with a credential satisfying the access policy of the record while the database server learns nothing about the record or the credential. The only AC-OT construction that supports policy in disjunctive form requires duplication of records in the database, each with a different conjunction of attributes (representing one possible criterion for accessing the record). In this paper, we propose a new AC-OT construction secure in the standard model. It supports policy in disjunctive form directly, without the above duplication issue. Due to the duplication issue in the previous construction, the size of an encrypted record is in O( ∏t i=1 ni) for a CNF policy (A1,1 ∨ . . . ∨ A1,n1) ∧ . . . ∧ (At,1 ∨ . . . ∨ At,nt) and in O( ( n k ) ) for a k-ofn threshold gate. In our construction, the encrypted record size can be reduced to O( ∑t i=1 ni) for CNF form and O(n) for threshold case.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials

In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary application, we show how to construct privacy-preserving databases by combining oblivious transfer with an augmented anonymous credential system. This permits a database operator to restrict which items each user may a...

متن کامل

Cryptography and security: Quick reference

Part II Themes Communication in the presence of an adversary. Encryption; efficiency of encryption: important due to pervasive communication; Batch verification. Authentication. Key distribution. Access control. Crypto-analysis: Break hardness assumptions used in cryptography. Make better proofs of security. Proving the security of protocols. Code obfuscation: Hide your intent. 0 knowledge proo...

متن کامل

Adaptive Oblivious Transfer and Generalization

Oblivious Transfer (OT) protocols were introduced in the seminal paper of Rabin, and allow a user to retrieve a given number of lines (usually one) in a database, without revealing which ones to the server. The server is ensured that only this given number of lines can be accessed per interaction, and so the others are protected; while the user is ensured that the server does not learn the numb...

متن کامل

Blind attribute-based encryption and oblivious transfer with fine-grained access control

We propose two constructions of oblivious transfer with access control (OTAC), i.e., oblivious transfer schemes in which a receiver can obtain a message only if her attributes, which are certified by a credential issuer, satisfy the access control policy of that message. The receiver remains anonymous towards the sender and the receiver’s attributes are not disclosed to the sender. Our construc...

متن کامل

Adaptive Oblivious Transfer with Access Control from Lattice Assumptions

Adaptive oblivious transfer (OT) is a protocol where a sender initially commits to a database {Mi}i=1. Then, a receiver can query the sender up to k times with private indexes ρ1, . . . , ρk so as to obtain Mρ1 , . . . ,Mρk and nothing else. Moreover, for each i ∈ [k], the receiver’s choice ρi may depend on previously obtained messages {Mρj}j<i. Oblivious transfer with access control (OT-AC) is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010