Browse > Article
http://dx.doi.org/10.13089/JKIISC.2003.13.1.11

Non-Interactive Oblivious Transfer Protocol based on EIGamal in WAP  

정경숙 (경희대학교 컴퓨터공학과 인터넷 & 지능시스템연구실)
홍석미 (경희대학교 컴퓨터공학과 인터넷 & 지능시스템연구실)
정태충 (경희대학교 컴퓨터공학과)
Abstract
As the Internet moves to mobile environment, one of the most serious problems for the security is to required a new security Protocol with safety and efficiency. To solve the problem. we Propose a new Protocol that reduces the communication franc and solves the problem associated with the private security keys supplied by the trusted third party. The protocol is a non-Interactive oblivious transfer protocol, based on the EIGamal public-key algorithm. Due to its Non-Interactive oblivious transfer protocol, it can effectively reduce communication traffic in server-client environment. And it is also possible to increase the efficiency of protocol through the mechanism that authentication probability becomes lower utilizing a challenge selection bit. The protocol complexity becomes higher because it utilizes double exponentiation. This means that the protocol is difficult rather than the existing discrete logarithm or factorization in prime factors. Therefore this can raise the stability of protocol.
Keywords
WAP(Wireless application protocol); oblivious transfer; EIGamal function;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 How to Exchange Secret Keys /
[ M. Blum ] / ACM Trans. Compute System
2 How to Exchange secrets by oblivious transfer /
[ M. O. Rabin ] / Technical Report Tech, Memo TR-81, aiken Computation Labs
3 불확정 전송을 이용한 패스워드 기반 인증 프로토콜 /
[ 현상우;류종호;염흥렬 ] / CISC2000
4 /
[ WAP Forum ] / Wireless Application Protocol Technical White paper
5 A modular approach to the design and analysis of authentication an key exchange protocol /
[ M. Bellare;R. Canetti;H. Krawczyk ] / Crypto '89
6 Fair Blind Signatures /
[ M. Stadler;J. M. Piveteau;J. Camenisch ] / Advances in Cryptology-EUROCRYPT '95, Lecture notes in Computer Science
7 A Public key cryptosystem and a signature scheme based on discrete logarithms /
[ T. EI-Gamal ] / IEEE Trans. Inform. Theory
8 ECDSA를 적용한 ID 기반의 사용자 인증 및 키 교환 프로토콜 /
[ 박영호;박호상;정수환 ] / 정보보호학회 논문지   과학기술학회마을
9 /
[] / Weekly Electronics Information
10 Coin Flipping by Telephone /
[ M. Blum ] / IEEE, COMP-CON
11 A hard-core predicate for all one-way functions /
[ Goldreich;L. A. Levin ] / proceeding of the twenty first Annual ACM Symposium on theory of Computing
12 A Public key Cryptosystem and Signature Scheme Based on Discrete Logarithm /
[ T. ElGamal ] / IEEE Trans. Information Theory
13 Threshold key recovery system for RSA /
[ T. Okamoto ] / Proceedings of 1997 Security protocol Workshop
14 A Randomized Protocol for Signing Contracts /
[ S. Even;O.Goldreich;A. Lempel ] / Communications of the ACM