2006 | OriginalPaper | Buchkapitel
Conditional Oblivious Cast
verfasst von : Cheng-Kang Chu, Wen-Guey Tzeng
Erschienen in: Public Key Cryptography - PKC 2006
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
We introduce a new notion of
conditional oblivious cast
(COC), which involves three parties: a sender
S
and two receivers
A
and
B
. Receivers
A
and
B
own their secrets
x
and
y
, respectively, and the sender
S
holds the message
m
. In a COC scheme for the predicate
Q
(Q-COC),
A
and
B
send
x
and
y
in a masked form to
S
, and then
S
sends
m
to
A
and
B
such that they get
m
if and only if
Q
(
x
,
y
)=1. Besides, the secrets
x
and
y
can not be revealed to another receiver nor the sender. We also extend COC to 1-out-of-2 COC (COC
$^{\rm 1}_{\rm 2}$
) in which
S
holds two messages
m
0
and
m
1
, and
A
and
B
get
m
1
if
Q
(
x
,
y
)=1 and
m
0
otherwise. We give the definitions for COC and COC
$^{\rm 1}_{\rm 2}$
, and propose several COC and COC
$^{\rm 1}_{\rm 2}$
schemes for “equality”, “inequality”, and “greater than” predicates. These are fundamental schemes that are useful in constructing more complex secure interactive protocols. Our schemes are efficiently constructed via homomorphic encryption schemes and proved secure under the security of these encryption schemes.