dc.contributor.author | Rezaei Kashi, Maryam | en_US |
dc.contributor.author | Bahramian, Mojtaba | en_US |
dc.date.accessioned | 1402-06-05T01:10:56Z | fa_IR |
dc.date.accessioned | 2023-08-27T01:10:57Z | |
dc.date.available | 1402-06-05T01:10:56Z | fa_IR |
dc.date.available | 2023-08-27T01:10:57Z | |
dc.date.issued | 2023-07-01 | en_US |
dc.date.issued | 1402-04-10 | fa_IR |
dc.date.submitted | 2022-04-06 | en_US |
dc.date.submitted | 1401-01-17 | fa_IR |
dc.identifier.citation | Rezaei Kashi, Maryam, Bahramian, Mojtaba. (2023). Oblivious Transfer Using Generalized Jacobian of Elliptic Curves. The ISC International Journal of Information Security, 15(2), 260-273. doi: 10.22042/isecure.2023.336301.779 | en_US |
dc.identifier.issn | 2008-2045 | |
dc.identifier.issn | 2008-3076 | |
dc.identifier.uri | https://dx.doi.org/10.22042/isecure.2023.336301.779 | |
dc.identifier.uri | https://www.isecure-journal.com/article_172258.html | |
dc.identifier.uri | https://iranjournals.nlai.ir/handle/123456789/1024776 | |
dc.description.abstract | Oblivious transfer is one of the important tools in cryptography, in which a sender sends a message to a receiver with a probability between 0 and 1, while the sender remains oblivious that the receiver has received the message.A flavor of $OT$ schemes is chosen $t$-out-of-$k$ oblivious transfer ($OT^t_k$). In an $OT^t_k$ scheme, a sender transfers $k$ messages to a receiver, the receiver can learn only $t$ of them, and the sender remains oblivious to which secrets are extracted by the receiver. In this paper, we first propose a type of Diffie-Hellman key exchange protocol using the generalized Jacobian of elliptic curves. Next, we introduce simple, secure two-round algorithms for $OT$, $OT^1_2$, $OT^t_k$.The security of proposed protocols is based on the intractability assumption of solving discrete logarithm problem; furthermore, in our $OT$ schemes, it is not necessary to map the messages to the points on the elliptic curve. | en_US |
dc.format.extent | 1158 | |
dc.format.mimetype | application/pdf | |
dc.language | English | |
dc.language.iso | en_US | |
dc.publisher | Iranian Society of Cryptology | en_US |
dc.relation.ispartof | The ISC International Journal of Information Security | en_US |
dc.relation.isversionof | https://dx.doi.org/10.22042/isecure.2023.336301.779 | |
dc.subject | Elliptic Curves | en_US |
dc.subject | Generalized Jacobians | en_US |
dc.subject | Oblivious Transfer | en_US |
dc.subject | t-out-of-k Oblivious Transfer | en_US |
dc.title | Oblivious Transfer Using Generalized Jacobian of Elliptic Curves | en_US |
dc.type | Text | en_US |
dc.type | Research Article | en_US |
dc.contributor.department | Department of Pure Mathematics, Faculty of Mathematical Sciences, University of Kashan, Kashan, Iran | en_US |
dc.contributor.department | Department of Pure Mathematics, Faculty of Mathematical Sciences, University of Kashan, Kashan, Iran | en_US |
dc.citation.volume | 15 | |
dc.citation.issue | 2 | |
dc.citation.spage | 260 | |
dc.citation.epage | 273 | |