Efficient and fully simulated oblivious transfer protocol on elliptic curve

Oblivious transfer protocol, an important technology in secure multi-party computation, is the research hotspot on network and information security.Based on the bilinear pairs and the difficult problems on elliptic curves, an efficient 1-out-of-N oblivious transfer protocol in the semi-honest model...

Full description

Saved in:
Bibliographic Details
Main Authors: Jiashuo SONG, Zhenzhen LI, Haiyang DING, Zichen LI
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2023-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023012
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529584116301824
author Jiashuo SONG
Zhenzhen LI
Haiyang DING
Zichen LI
author_facet Jiashuo SONG
Zhenzhen LI
Haiyang DING
Zichen LI
author_sort Jiashuo SONG
collection DOAJ
description Oblivious transfer protocol, an important technology in secure multi-party computation, is the research hotspot on network and information security.Based on the bilinear pairs and the difficult problems on elliptic curves, an efficient 1-out-of-N oblivious transfer protocol in the semi-honest model and in the standard malicious model were proposed respectively.The protocol in semi-honest model was designed.It only needed two rounds of interaction.The receiver needed two times of bilinear pair arithmetic and one time of multi point arithmetic, and the sender needed n times of multi point arithmetic and n times of modular exponentiation.The security of the protocol was based on the discrete logarithm problem on elliptic curves.A zero-knowledge proof protocol and the oblivious transfer protocol in the standard malicious model were proposed respectively.The oblivious transfer protocol only needed four rounds of interaction.The receiver needed three times of bilinear pair arithmetic and three times of multi point arithmetic, and the sender needed n+1 times of multi point arithmetic and n+1 times of modular exponentiation.Besides, it can resist malicious behaviors of the party.The results show that the average running time of the protocol in the semi-honest model and in the standard malicious model were 0.787 9 s and 1.205 6 s respectively, which can further demonstrate the efficiency of the protocol.
format Article
id doaj-art-0a3126e72af04cf7b1ab866cfc0c966d
institution Kabale University
issn 2096-109X
language English
publishDate 2023-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-0a3126e72af04cf7b1ab866cfc0c966d2025-01-15T03:16:32ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2023-02-01915816659577541Efficient and fully simulated oblivious transfer protocol on elliptic curveJiashuo SONGZhenzhen LIHaiyang DINGZichen LIOblivious transfer protocol, an important technology in secure multi-party computation, is the research hotspot on network and information security.Based on the bilinear pairs and the difficult problems on elliptic curves, an efficient 1-out-of-N oblivious transfer protocol in the semi-honest model and in the standard malicious model were proposed respectively.The protocol in semi-honest model was designed.It only needed two rounds of interaction.The receiver needed two times of bilinear pair arithmetic and one time of multi point arithmetic, and the sender needed n times of multi point arithmetic and n times of modular exponentiation.The security of the protocol was based on the discrete logarithm problem on elliptic curves.A zero-knowledge proof protocol and the oblivious transfer protocol in the standard malicious model were proposed respectively.The oblivious transfer protocol only needed four rounds of interaction.The receiver needed three times of bilinear pair arithmetic and three times of multi point arithmetic, and the sender needed n+1 times of multi point arithmetic and n+1 times of modular exponentiation.Besides, it can resist malicious behaviors of the party.The results show that the average running time of the protocol in the semi-honest model and in the standard malicious model were 0.787 9 s and 1.205 6 s respectively, which can further demonstrate the efficiency of the protocol.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023012oblivious transferfully simulationbilinear pairingzero-knowledge proofsecure multi-party computation
spellingShingle Jiashuo SONG
Zhenzhen LI
Haiyang DING
Zichen LI
Efficient and fully simulated oblivious transfer protocol on elliptic curve
网络与信息安全学报
oblivious transfer
fully simulation
bilinear pairing
zero-knowledge proof
secure multi-party computation
title Efficient and fully simulated oblivious transfer protocol on elliptic curve
title_full Efficient and fully simulated oblivious transfer protocol on elliptic curve
title_fullStr Efficient and fully simulated oblivious transfer protocol on elliptic curve
title_full_unstemmed Efficient and fully simulated oblivious transfer protocol on elliptic curve
title_short Efficient and fully simulated oblivious transfer protocol on elliptic curve
title_sort efficient and fully simulated oblivious transfer protocol on elliptic curve
topic oblivious transfer
fully simulation
bilinear pairing
zero-knowledge proof
secure multi-party computation
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023012
work_keys_str_mv AT jiashuosong efficientandfullysimulatedoblivioustransferprotocolonellipticcurve
AT zhenzhenli efficientandfullysimulatedoblivioustransferprotocolonellipticcurve
AT haiyangding efficientandfullysimulatedoblivioustransferprotocolonellipticcurve
AT zichenli efficientandfullysimulatedoblivioustransferprotocolonellipticcurve