2006 | OriginalPaper | Chapter
Conditional Oblivious Cast
Authors : Cheng-Kang Chu, Wen-Guey Tzeng
Published in: Public Key Cryptography - PKC 2006
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
We introduce a new notion of
conditional oblivious cast
(COC), which involves three parties: a sender
S
and two receivers
A
and
B
. Receivers
A
and
B
own their secrets
x
and
y
, respectively, and the sender
S
holds the message
m
. In a COC scheme for the predicate
Q
(Q-COC),
A
and
B
send
x
and
y
in a masked form to
S
, and then
S
sends
m
to
A
and
B
such that they get
m
if and only if
Q
(
x
,
y
)=1. Besides, the secrets
x
and
y
can not be revealed to another receiver nor the sender. We also extend COC to 1-out-of-2 COC (COC
$^{\rm 1}_{\rm 2}$
) in which
S
holds two messages
m
0
and
m
1
, and
A
and
B
get
m
1
if
Q
(
x
,
y
)=1 and
m
0
otherwise. We give the definitions for COC and COC
$^{\rm 1}_{\rm 2}$
, and propose several COC and COC
$^{\rm 1}_{\rm 2}$
schemes for “equality”, “inequality”, and “greater than” predicates. These are fundamental schemes that are useful in constructing more complex secure interactive protocols. Our schemes are efficiently constructed via homomorphic encryption schemes and proved secure under the security of these encryption schemes.