%0 Journal Article
%T Hidden Authentication Oblivious Transfer
隐藏认证的不经意传输
%A Zhao Chun-ming
%A Ge Jiang-hua
%A Li Xin-guo
%A
赵春明
%A 葛建华
%A 李新国
%J 电子与信息学报
%D 2007
%I
%X Hidden authentication oblivious transfer based on k-out-of-n oblivious transfer and hidden credentials is proposed which solved the problem that standard certificated-based access control to oblivious transfer may exposure some sensitive information of the receiver. The scheme proposed has the property that only the receiver who has the required attribute credentials can open the message it chooses and the receiver need not provide to the sender any credentials. The sender can not decide whether the receiver can open the messages or not and the sender can not know which messages that the receiver acquires also. The security in the random oracle model is proved under the BDH assumption and the CT-CDH assumption.
%K Oblivious transfer
%K Access control
%K Hidden credentials
%K Bilinear pairing
%K BDH assumption
不经意传输
%K 访问控制
%K 隐藏证书
%K 双线性对
%K BDH假设
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=1319827C0C74AAE8D654BEA21B7F54D3&jid=EFC0377B03BD8D0EF4BBB548AC5F739A&aid=8857F6C89D54C165&yid=A732AF04DDA03BB3&vid=771469D9D58C34FF&iid=5D311CA918CA9A03&sid=36250D1D6BDC99BD&eid=4E65715CCF57055A&journal_id=1009-5896&journal_name=电子与信息学报&referenced_num=0&reference_num=7