Unconditional security and privacy preserving oblivious transfer

Ghodosi, Hossein, and Lee, Ickjai (2012) Unconditional security and privacy preserving oblivious transfer. In: Proceedings of the 7th International Conference on Computing and Convergence Technology (ICCCT2012) (7) pp. 1042-1047. From: 2012 7th International Conference on Computing and Convergence Technology, 3-5 December 2012, Seoul, Korea.

[img] PDF (Published Version) - Published Version
Restricted to Repository staff only

 
5


Abstract

Various cybercrimes are major threats to Ebusiness. We propose an offline oblivious data distribution framework that preserves the sender's security and the receiver's privacy using tamper-proof smart cards. This framework provides persistent content protections from digital piracy and promises private content consumption. In contrast to all known oblivious transfer protocols that require public key operations, our approach does not require any public/private key operation and consequently it is computationally very efficient. It is particularly useful for data-intensive and data-rich environments. In addition, our framework is flexible to manage various business scenarios and diverse generalized oblivious transfer models.

Item ID: 25377
Item Type: Conference Item (Research - E1)
ISBN: 978-89-94364-21-6
Related URLs:
Date Deposited: 17 Apr 2013 23:05
FoR Codes: 08 INFORMATION AND COMPUTING SCIENCES > 0804 Data Format > 080402 Data Encryption @ 100%
SEO Codes: 89 INFORMATION AND COMMUNICATION SERVICES > 8902 Computer Software and Services > 890202 Application Tools and System Utilities @ 100%
Downloads: Total: 5
More Statistics

Actions (Repository Staff Only)

Item Control Page Item Control Page