2010
DOI: 10.1007/978-3-642-14577-3_8
|View full text |Cite
|
Sign up to set email alerts
|

Unlinkable Priced Oblivious Transfer with Rechargeable Wallets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 30 publications
(46 citation statements)
references
References 21 publications
0
46
0
Order By: Relevance
“…In Camenisch et al's OT construction [2,3], the entire encrypted database is published. The encryption key for the i th record is a unique signature on the message "i".…”
Section: Symmetric Pir and Oblivious Transfermentioning
confidence: 99%
See 2 more Smart Citations
“…In Camenisch et al's OT construction [2,3], the entire encrypted database is published. The encryption key for the i th record is a unique signature on the message "i".…”
Section: Symmetric Pir and Oblivious Transfermentioning
confidence: 99%
“…Since the signature is blind, the signer does not learn the message to be signed, which is the index of the record. In order to enforce access control (AOT [2]) or pricing (POT [3]), access control or pricing information is encoded in the signature as well. The client proves that the blinded message is well formed, and that her credential satisfies the access control policy specified in that blinded message.…”
Section: Symmetric Pir and Oblivious Transfermentioning
confidence: 99%
See 1 more Smart Citation
“…By combining anonymous credentials with adaptive oblivious transfer protocols, solutions exist where the user can obtain the records she's entitled to, without revealing the applicable access control policy to the database, or which roles she has [CDN09]. By another combination of such techniques, the database can attach different prices for each record, and let users only download as many records as their prepaid balance allows, all while remaining completely anonymous [CDN10].…”
Section: Example Applicationsmentioning
confidence: 99%
“…As explained in [14], these protocols fail even under sequential composition and are shown to be vulnerable to practical attacks. Afterwards, a number of universally composable (UC)-secure priced oblivious transfer protocols have been proposed [19], [10], [20]. The UCsecurity paradigm [12] provides a framework for representing cryptographic protocols and analysing their security.…”
Section: Introductionmentioning
confidence: 99%