Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol

Qinglong Wang Jintai Ding CPS Lab, Chongqing University, Chongqing, China; Department of Mathematics, University of Cincinnati, Cincinnati, OH 45220, USA

TBD mathscidoc:2207.43069

Cryptologia, 38, (4), 370-376, 2014.8
In this article, the authors cryptanalyze a k-out-of-n oblivious transfer protocol proposed in [12]. Their protocol is one of the most efficient k-out-of-n oblivious transfer protocols and is directly built from a 1-out-of-n oblivious transfer protocol. However, their analysis shows that the proposed k-out-of-n oblivious transfer protocol is insecure, though the primitive 1-out-of-n oblivious transfer protocol is secure. The weakness is that with high probability the receiver in their protocol can get all n secret messages encrypted by the sender. Finally, they fix the serious flaw and introduce an improved k-out-of-n oblivious transfer protocol without increasing any cost.
No keywords uploaded!
[ Download ] [ 2022-07-14 14:39:50 uploaded by dingjt ] [ 670 downloads ] [ 0 comments ]
@inproceedings{qinglong2014cryptanalysis,
  title={Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol},
  author={Qinglong Wang, and Jintai Ding},
  url={http://archive.ymsc.tsinghua.edu.cn/pacm_paperurl/20220714143950437648647},
  booktitle={Cryptologia},
  volume={38},
  number={4},
  pages={370-376},
  year={2014},
}
Qinglong Wang, and Jintai Ding. Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol. 2014. Vol. 38. In Cryptologia. pp.370-376. http://archive.ymsc.tsinghua.edu.cn/pacm_paperurl/20220714143950437648647.
Please log in for comment!
 
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved