Analysis of oblivious transfer
J4
• Original Articles • Previous Articles Next Articles
JIANG Zheng-tao;HAO Yan-hua;WANG Yu-min
Received:
Revised:
Online:
Published:
Abstract: We analyze the security of the three m out of n oblivious transfer schemes proposed by Y.Mu et al, and then point out the insecurities of their schemes. We also provide our improvements on them respectively, which prevent users from getting more messages or disobeying the protocol. One of the improved schemes is more efficient than all the schemes proposed by Y.Mu et al.
Key words: oblivious transfer, security analysis, improved protocol
CLC Number:
JIANG Zheng-tao;HAO Yan-hua;WANG Yu-min.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://journal.xidian.edu.cn/xdxb/EN/
https://journal.xidian.edu.cn/xdxb/EN/Y2005/V32/I1/130
Forgery attack on a proxy-blind signature scheme
Security analysis of the Chinese wireless LAN standard implementation plan
RSA-based enhanced oblivious transfer protocol
Oblivious transfer with extractors
Cited