The Essential Design Principles of Verifiable Non-interactive OT Protocols
- Resource Type
- Conference
- Authors
- Chang, Ya-Fen; Shiao, Wei-Cheng
- Source
- 2008 Eighth International Conference on Intelligent Systems Design and Applications Intelligent Systems Design and Applications, 2008. ISDA '08. Eighth International Conference on. 3:241-245 Nov, 2008
- Subject
- Computing and Processing
Protocols
Public key cryptography
Computer science
Privacy
Information security
Intelligent systems
Application software
Design engineering
Information technology
oblivious transfer
non-interactive
security
ElGamal
- Language
- ISSN
- 2164-7143
2164-7151
OT (oblivious transfer) is an important e-commerce technique to make information buyers be able to get desired information and preserve privacy at the sametime. Recently, Kim et al. proposed two 1-out-of-2 NIOT (non-interactive OT) schemes. They claimed the message sender can be verified in their schemes. Unfortunately, their schemes are insecure. In this paper, we will make thorough discussions on the design principles of secure verifiable NIOT schemes.