Skip to main content
Log in

Oblivious transfer with access control and identity-based encryption with anonymous key issuing

  • Published:
Journal of Electronics (China)

Abstract

In ACM’CCS 2009, Camenisch, et al. proposed the Oblivious Transfer with Access Control (AC-OT) in which each item is associated with an attribute set and can only be available, on request, to the users who have all the attributes in the associated set. Namely, AC-OT achieves access control policy for conjunction of attributes. Essentially, the functionality of AC-OT is equivalent to the simplified version that we call AC-OT-SV: for each item, one attribute is associated with it, and it is requested that only the users who possess the associated attribute can obtain the item by queries. On one hand, AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item. On the other hand, any AC-OT can be realized by an AC-OT-SV. In this paper, we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch, et al. Then from the protocol, interestingly, a concrete Identity-Based Encryption (IBE) with Anonymous Key Issuing (AKI) is given which is just a direct application to AC-OT-SV. By comparison, we show that the AKI protocol we present is more efficient in communications than that proposed by Chow.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. M. O. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory, 1981, 1–4.

  2. C. K. Chu and W. G. Tzeng. Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries. PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, 2005, 172–183.

  3. J. Camenisch, G. Neven, and A. Shelat. Simulatable adaptive oblivious transfer. EUROCRYPT 2007, International Conference on the Theory and Application of Cryptographic Techniques, Barcelona, Spain, 2007, 573–590.

  4. M. Green and S. Hohenberger. Blind identity-based encryption and simulatable oblivious tranfer. ASIACRYPT 2007, 4th International Conference on the Theory and Applications of Cryptology, Kuching, Sarawak, Malaysia, 2007, 265–282.

  5. J. Camenisch, M. Dubovitskaya, and G. Neven. Oblivious transfer with access control. 16th ACM Conference on Computer and Communications Security, Hyatt Regency Chicago, Chicago, IL, USA, 2009, 131–140.

  6. D. Crescenzo, G. Ostrovsky, and R. Rajagopalan. Conditional oblivious transfer and time-release encryption. EUROCRYPT 1999, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, 1999, 74–89.

  7. S. M. Chow. Removing escrow from identity-based encryption. PKC 2009, 12th International Workshop on Theory and Practice in Public Key Cryptography, Irvine, California, 2009, 256–276.

  8. R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. CRYPTO 1994, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, 1994, 174–187.

  9. J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. CRYPTO 1997, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, 1997, 410–424.

  10. F.G. Zhang, R. Safavi-Naini, and W. Susilo. An efficient signature scheme from bilinear pairings and its applications. PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, 2004, 277–290.

  11. I. Damgård. Efficient concurrent zero-knowledge in the auxiliary string model. EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, 2000, 418–430.

  12. M. Belenkiy, M. Chase, M. Kohlweiss, and A. Lysyanskaya. P-signature and noninteractive anonymous credentials. TCC 2008, 5th IACR Theory of Cryptography, New York, USA, 2008, 356–374.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fangguo Zhang.

Additional information

Communication author: Zhang Fangguo, born in 1972, male, Professor.

About this article

Cite this article

Xu, L., Zhang, F. & Wen, Y. Oblivious transfer with access control and identity-based encryption with anonymous key issuing. J. Electron.(China) 28, 571–579 (2011). https://doi.org/10.1007/s11767-012-0554-z

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11767-012-0554-z

Key words

CLC index

Navigation