• DocumentCode
    7343
  • Title

    Subset Membership Encryption and Its Applications to Oblivious Transfer

  • Author

    Fuchun Guo ; Yi Mu ; Susilo, Willy

  • Author_Institution
    Sch. of Comput. Sci. & Software Eng., Univ. of Wollongong, Wollongong, NSW, Australia
  • Volume
    9
  • Issue
    7
  • fYear
    2014
  • fDate
    Jul-14
  • Firstpage
    1098
  • Lastpage
    1107
  • Abstract
    In this paper, we propose a novel cryptographic notion called subset membership encryption (SME), and provide a very efficient SME scheme. Given a system parameter generated by an encryptor (Alice), a decryptor (Bob) generates a randomized privacy-preserved attribute token P(G) from a set of attributes G. A message is encrypted using an attribute set A chosen by Alice and P(G) provided by Bob. It requires that A is a subset of G for Bob to decrypt the message. We propose a very efficient SME scheme, where both the size of P(G) and ciphertext are short and independent of G and A. In particular, it has three useful and practical applications to oblivious transfer as follows. 1) k-Out-of-n Oblivious Transfer (OT): SME can be naturally applied to a two-round OT, which features a great communication efficiency especially for the receiver, where the receiver only sends two group elements to the message sender. 2) Priced Oblivious Transfer (POT): Our POT protocol allows a buyer to purchase any number of items in each transaction and hide selected items, price and balance from the vendor. In comparison with previous POT protocols, our protocol is more flexible and eliminates the restriction that a buyer can only purchase one item in a transaction. Our POT scheme is very efficient since it does not require any zero-knowledge proof or homomorphic encryption. 3) Restricted Priced Oblivious Transfer (RPOT): We introduce a novel POT named RPOT where a vendor can set restrictions on items or prices in POT. For example, a seller could offer a discounted price to those buyers who have purchased some specific items previously from the same seller.
  • Keywords
    cryptographic protocols; data privacy; Alice encryptor; Bob decryptor; POT protocol; RPOT; SME scheme; attribute set; ciphertext; cryptographic notion; k-out-of-n oblivious transfer; priced oblivious transfer; randomized privacy-preserved attribute token; restricted priced oblivious transfer; subset membership encryption; two-round OT; zero-knowledge proof; Encryption; Games; Privacy; Protocols; Receivers; Encryption; oblivious transfer;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2014.2322257
  • Filename
    6815975