Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12]

¡@

Journal of Information Science and Engineering, Vol. 28 No. 3, pp. 555-570 (May 2012)

Oblivious Transfer with Threshold Access Control*

LING-LING XU AND FANG-GUO ZHANG+
School of Information Science and Technology
Sun Yat-sen University
Guangzhou, 510275 P.R. China

In this paper, we introduce the concept of oblivious transfer with threshold access control. Namely, for each message in a database, the server associates an attribute set £n with it such that the message can only be available, on request, to the users who possess at least t attributes out of £n. Meanwhile, after the server and users execute the protocol, the server will not learn anything about the identities, attributes or message choices of the users. The essential idea of ¡§threshold¡¨ access control is to define the minimum number of attributes from a given set of attributes that users have to possess in order to obtain the message. Combining Sahai and Waters¡¦ fuzzy identity-based encryption with a credential signature scheme, we present a concrete construction for the oblivious transfer with threshold access control which is proved secure in the standard model.

Keywords: oblivious transfer, threshold, access control, fuzzy identity-based encryption, credential signature

Full Text (¥ş¤åÀÉ) Retrieve PDF document (201205_08.pdf)

Received May 27, 2010; revised August 27 & September 23, 2010; accepted October 6, 2010.
Communicated by Tzong-Chen Wu.
* This paper was supported by the National Natural Science Foundation of China (Nos. 60773202, 61070168) and 973 Program (No. 2006CB303104).
+ Corresponding author.