Conditional oblivious cast

Cheng Kang Chu*, Wen-Guey Tzeng

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

We introduce a new notion of conditional oblivious cast. (COC), which involves three parties: a sender S and two receivers A and B. Receivers A and B own their secrets x and y, respectively, and the sender S holds the message m. In a COC scheme for the predicate Q (Q-COC), A and B send x and y in a masked form to S, and then S sends m to A and B such that they get m if and only if Q(x,y) = 1. Besides, the secrets x and y can not be revealed to another receiver nor the sender. We also extend COC to 1-out-of-2 COC (COC 21) in which S holds two messages m0 and m 1, and A and B get m1 if Q(x,y) = 1 and m0 otherwise. We give the definitions for COC and COC21, and propose several COC and COC21 schemes for "equality", "inequality", and "greater than" predicates. These are fundamental schemes that are useful in constructing more complex secure interactive protocols. Our schemes are efficiently constructed via homomorphic encryption schemes and proved secure under the security of these encryption schemes.

Original languageEnglish
Title of host publicationPublic Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings
Pages443-457
Number of pages15
DOIs
StatePublished - 17 Jul 2006
Event9th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2006 - New York, NY, United States
Duration: 24 Apr 200626 Apr 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3958 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2006
CountryUnited States
CityNew York, NY
Period24/04/0626/04/06

Keywords

  • Conditional oblivious transfer
  • Oblivious cast
  • Secure computation

Fingerprint Dive into the research topics of 'Conditional oblivious cast'. Together they form a unique fingerprint.

Cite this