
Research on the security Oblivious Transfer protocol based on ECDDH
Author(s) -
Xiaotian Wang,
ZiChen Li
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1549/3/032152
Subject(s) - oblivious transfer , communication source , correctness , computer science , protocol (science) , theoretical computer science , cryptographic protocol , transfer (computing) , computer security , cryptography , computer network , algorithm , parallel computing , medicine , alternative medicine , pathology
A new type of Oblivious Transfer protocol is designed under the assumption of ECDDH. The protocol can be safely implemented under a malicious model, 1 of which are selected in N input values. The RAND function is defined under this assumption, and the security definition is given. Then, the security interaction mode of the sender and receiver is constructed. Finally, the correctness of the Protocol is analyzed and the security proof is given. The protocol has the interaction complexity of the constant number level, and the computational and communication complexity is only related to n linearity.