咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Two t-out-of-n Oblivious Trans... 收藏

Two t-out-of-n Oblivious Transfer Schemes with Designated Receiver

Two t-out-of-n Oblivious Transfer Schemes with Designated Receiver

作     者:ZHANG Jianhong ZOU Wei 

作者机构:College of Science North China University of Technology Beijing 100041 China Institute of Software of Chinese Academy of Sciences/State Key Laboratory of Information Security Beijing 100080 China 

出 版 物:《Wuhan University Journal of Natural Sciences》 (武汉大学学报(自然科学英文版))

年 卷 期:2006年第11卷第6期

页      面:1903-1906页

学科分类:11[军事学] 1105[军事学-军队指挥学] 0839[工学-网络空间安全] 08[工学] 110505[军事学-密码学] 110503[军事学-军事通信学] 

基  金:Supported by Scientific Research Common Programof Beijing Municipal Commission of Education ( KM200610009011) Open Fund of State Key Laboratory of Information Security(Institute of Software of Chinese Academy of Sciences) (02-4) 

主  题:oblivious transfer designated verifier efficiency 

摘      要:Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n + 2t + 1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n + 3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分