J4

• Original Articles • Previous Articles     Next Articles

Analysis of oblivious transfer

JIANG Zheng-tao;HAO Yan-hua;WANG Yu-min   

  1. State Key Lab. of Integrated Service Networks, Xidian Univ., Xi′an 710071, China
  • Received:1900-01-01 Revised:1900-01-01 Online:2005-02-20 Published:2005-02-20

Abstract: We analyze the security of the three m out of n oblivious transfer schemes proposed by Y.Mu et al, and then point out the insecurities of their schemes. We also provide our improvements on them respectively, which prevent users from getting more messages or disobeying the protocol. One of the improved schemes is more efficient than all the schemes proposed by Y.Mu et al.

Key words: oblivious transfer, security analysis, improved protocol

CLC Number: 

  • TP309+.2