scholarly journals Fast Contract Signing with Batch Oblivious Transfer

Author(s):  
L’ubica Staneková ◽  
Martin Stanek
2022 ◽  
Author(s):  
Vijay Kumar Yadav ◽  
Nitish Andola ◽  
Shekhar Verma ◽  
S Venkatesan

Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide range of applications like secure multi-party computation, private information retrieval, private set intersection, contract signing, and privacy-preserving location-based services. The OT protocol has different variants such as one-out-of-2, one-out-of- n , k -out-of- n , and OT extension. In the OT (one-out-of-2, one-out-of- n , and OT extension) protocol, the sender has a set of messages, whereas the receiver has a key. The receiver sends that key to the sender in a secure way; the sender cannot get any information about the received key. The sender encrypts every message by operating on every message using the received key and sends all the encrypted messages to the receiver. The receiver is able to extract only the required message using his key. However, in the k -out-of- n OT protocol, the receiver sends a set of k keys to the sender, and in replay, the sender sends all the encrypted messages. The receiver uses his keys and extracts the required messages, but it cannot gain any information about the messages that it has not requested. Generally, the OT protocol requires high communication and computation cost if we transfer millions of oblivious messages. The OT extension protocol provides a solution for this, where the receiver transfers a set of keys to the sender by executing a few numbers of OT protocols. Then, the sender encrypts all the messages using cheap symmetric key cryptography with the help of a received set of keys and transfer millions of oblivious messages to the receiver. In this work, we present different variants of OT protocols such as one-out-of-2, one-out-of- n , k -out-of- n , and OT extension. Furthermore, we cover various aspects of theoretical security guarantees such as semi-honest and malicious adversaries, universally composable, used techniques, computation, and communication efficiency aspects. From the analysis, we found that the semi-honest adversary-based OT protocols required low communication and computation costs as compared to malicious adversary-based OT protocols.


2012 ◽  
Vol 6-7 ◽  
pp. 773-777 ◽  
Author(s):  
Yan Ling Wang

The intense competition of global markets and consumers' high expectations forced enterprises to invest and concentrate on the relationship with their customers and suppliers. The growing interest in supply chain management, both in developed and developing countries in the fisheries. With the catastrophic events in the fisheries supply chain, the diversity of the fisheries risk and insurance issues become increasingly important. However, participants in the supply chain is a separate and independent economic entities, and only consider their own interests. In this article, the fisheries supply chain insurance contract on the basis of the model and the diversity of the fisheries risk and insurance policy issues, the behavior of each participant. In this article, the diversity of the fisheries supply chain risk and insurance process, the lack of sufficient knowledge of the fisheries supply chain contract signing or the exact probability of the insured event, the fisheries supply chain risk insurance companies use the information provided by the fisheries supply chain contract signature the signing of the contract or the behavior of the fisheries supply chain insurers of people insured or fisheries supply chain and fisheries supply chain in order to establish the parameters of the insurance contract of the fisheries supply chain.


Author(s):  
Benoît Libert ◽  
San Ling ◽  
Fabrice Mouhartem ◽  
Khoa Nguyen ◽  
Huaxiong Wang

2016 ◽  
Vol 64 (3) ◽  
pp. 893-905 ◽  
Author(s):  
Jithin Ravi ◽  
Bikash Kumar Dey ◽  
Emanuele Viterbo

Sign in / Sign up

Export Citation Format

Share Document