Restricted adaptive oblivious transfer
In this work we consider the following primitive, that we call restricted adaptive oblivious transfer. On the one hand, the owner of a database wants to restrict the access of users to this data according to some policy, in such a way that a user can only obtain information satisfying the restrictio...
Saved in:
Published in | Theoretical computer science Vol. 412; no. 46; pp. 6498 - 6506 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
Oxford
Elsevier B.V
28.10.2011
Elsevier |
Subjects | |
Online Access | Get full text |
ISSN | 0304-3975 1879-2294 |
DOI | 10.1016/j.tcs.2011.06.023 |
Cover
Summary: | In this work we consider the following primitive, that we call restricted adaptive oblivious transfer. On the one hand, the owner of a database wants to restrict the access of users to this data according to some policy, in such a way that a user can only obtain information satisfying the restrictions imposed by the owner. On the other hand, a legitimate user wants to privately retrieve allowed parts of the data, in a sequential and adaptive way, without letting the owner know which part of the data is being obtained.
After having formally described the components and required properties of a protocol for restricted adaptive oblivious transfer, we propose two generic ways to realize this primitive. The first one uses a cryptographic tool which has received a lot of attention from the literature in recent years: cryptosystems which are both multiplicatively and additively homomorphic. Our second generic construction is based on secret sharing schemes. |
---|---|
Bibliography: | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
ISSN: | 0304-3975 1879-2294 |
DOI: | 10.1016/j.tcs.2011.06.023 |