Restricted adaptive oblivious transfer

In this work we consider the following primitive, that we call restricted adaptive oblivious transfer. On the one hand, the owner of a database wants to restrict the access of users to this data according to some policy, in such a way that a user can only obtain information satisfying the restrictio...

Full description

Saved in:
Bibliographic Details
Published inTheoretical computer science Vol. 412; no. 46; pp. 6498 - 6506
Main Author Herranz, Javier
Format Journal Article
LanguageEnglish
Published Oxford Elsevier B.V 28.10.2011
Elsevier
Subjects
Online AccessGet full text
ISSN0304-3975
1879-2294
DOI10.1016/j.tcs.2011.06.023

Cover

More Information
Summary:In this work we consider the following primitive, that we call restricted adaptive oblivious transfer. On the one hand, the owner of a database wants to restrict the access of users to this data according to some policy, in such a way that a user can only obtain information satisfying the restrictions imposed by the owner. On the other hand, a legitimate user wants to privately retrieve allowed parts of the data, in a sequential and adaptive way, without letting the owner know which part of the data is being obtained. After having formally described the components and required properties of a protocol for restricted adaptive oblivious transfer, we propose two generic ways to realize this primitive. The first one uses a cryptographic tool which has received a lot of attention from the literature in recent years: cryptosystems which are both multiplicatively and additively homomorphic. Our second generic construction is based on secret sharing schemes.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:0304-3975
1879-2294
DOI:10.1016/j.tcs.2011.06.023