نمایش مختصر رکورد

dc.contributor.authorRezaei Kashi, Maryamen_US
dc.contributor.authorBahramian, Mojtabaen_US
dc.date.accessioned1402-06-05T01:10:56Zfa_IR
dc.date.accessioned2023-08-27T01:10:57Z
dc.date.available1402-06-05T01:10:56Zfa_IR
dc.date.available2023-08-27T01:10:57Z
dc.date.issued2023-07-01en_US
dc.date.issued1402-04-10fa_IR
dc.date.submitted2022-04-06en_US
dc.date.submitted1401-01-17fa_IR
dc.identifier.citationRezaei Kashi, Maryam, Bahramian, Mojtaba. (2023). Oblivious Transfer Using Generalized Jacobian of Elliptic Curves. The ISC International Journal of Information Security, 15(2), 260-273. doi: 10.22042/isecure.2023.336301.779en_US
dc.identifier.issn2008-2045
dc.identifier.issn2008-3076
dc.identifier.urihttps://dx.doi.org/10.22042/isecure.2023.336301.779
dc.identifier.urihttps://www.isecure-journal.com/article_172258.html
dc.identifier.urihttps://iranjournals.nlai.ir/handle/123456789/1024776
dc.description.abstract‎Oblivious transfer is one of the important tools in cryptography‎, ‎in which a sender sends a message to a receiver with a probability between 0 and 1‎, ‎while the sender remains oblivious that the receiver has received the message‎.‎A flavor of $OT$ schemes is chosen $t$-out-of-$k$ oblivious transfer ($OT^t_k$)‎. ‎In an $OT^t_k$ scheme‎, ‎a sender transfers $k$ messages to a receiver‎, ‎the receiver can learn only $t$ of them‎, ‎and the sender remains oblivious to which secrets are extracted by the receiver‎. ‎In this paper‎, ‎we first propose a type of Diffie-Hellman key exchange protocol using the generalized Jacobian of elliptic curves‎. ‎Next‎, ‎we introduce simple‎, ‎secure two-round algorithms for $OT$‎, ‎$OT^1_2$‎, ‎$OT^t_k$‎.‎The security of proposed protocols is based on the intractability assumption of solving discrete logarithm problem; furthermore‎, ‎in our $OT$ schemes‎, ‎it is not necessary to map the messages to the points on the elliptic curve‎.en_US
dc.format.extent1158
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoen_US
dc.publisherIranian Society of Cryptologyen_US
dc.relation.ispartofThe ISC International Journal of Information Securityen_US
dc.relation.isversionofhttps://dx.doi.org/10.22042/isecure.2023.336301.779
dc.subject‎Elliptic Curvesen_US
dc.subjectGeneralized Jacobiansen_US
dc.subjectOblivious Transferen_US
dc.subjectt-out-of-k Oblivious Transferen_US
dc.titleOblivious Transfer Using Generalized Jacobian of Elliptic Curvesen_US
dc.typeTexten_US
dc.typeResearch Articleen_US
dc.contributor.departmentDepartment of Pure Mathematics, Faculty of Mathematical Sciences, University of Kashan, Kashan, Iranen_US
dc.contributor.departmentDepartment of Pure Mathematics, Faculty of Mathematical Sciences, University of Kashan, Kashan, Iranen_US
dc.citation.volume15
dc.citation.issue2
dc.citation.spage260
dc.citation.epage273


فایل‌های این مورد

Thumbnail

این مورد در مجموعه‌های زیر وجود دارد:

نمایش مختصر رکورد