Oblivious Transfer using Elliptic Curves

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

We introduce the idea of Oblivious Transfer to Elliptic Curve Cryptography (ECC), which has the advantage of providing same security with a 160-bit key compared to 1024-bit key needed by RSA. Oblivious Transfer forms the basis of numerous protocols which can all now be analogously developed in ECC using the algorithm we present in this paper. Also, we look into one of its important applications known as chosen one-out-of-two Oblivious Transfer and present a protocol for it using the algorithm we discuss.

Original languageEnglish (US)
Title of host publicationProceedings - 15th International Conference on Computing, CIC 2006
Pages323-328
Number of pages6
DOIs
StatePublished - Dec 1 2006
Event15th International Conference on Computing, CIC 2006 - Mexico City, Mexico
Duration: Nov 21 2006Nov 24 2006

Publication series

NameProceedings - 15th International Conference on Computing, CIC 2006

Conference

Conference15th International Conference on Computing, CIC 2006
CountryMexico
CityMexico City
Period11/21/0611/24/06

Fingerprint

Cryptography

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Parakh, A. (2006). Oblivious Transfer using Elliptic Curves. In Proceedings - 15th International Conference on Computing, CIC 2006 (pp. 323-328). [4023828] (Proceedings - 15th International Conference on Computing, CIC 2006). https://doi.org/10.1109/CIC.2006.49

Oblivious Transfer using Elliptic Curves. / Parakh, Abhishek.

Proceedings - 15th International Conference on Computing, CIC 2006. 2006. p. 323-328 4023828 (Proceedings - 15th International Conference on Computing, CIC 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Parakh, A 2006, Oblivious Transfer using Elliptic Curves. in Proceedings - 15th International Conference on Computing, CIC 2006., 4023828, Proceedings - 15th International Conference on Computing, CIC 2006, pp. 323-328, 15th International Conference on Computing, CIC 2006, Mexico City, Mexico, 11/21/06. https://doi.org/10.1109/CIC.2006.49
Parakh A. Oblivious Transfer using Elliptic Curves. In Proceedings - 15th International Conference on Computing, CIC 2006. 2006. p. 323-328. 4023828. (Proceedings - 15th International Conference on Computing, CIC 2006). https://doi.org/10.1109/CIC.2006.49
Parakh, Abhishek. / Oblivious Transfer using Elliptic Curves. Proceedings - 15th International Conference on Computing, CIC 2006. 2006. pp. 323-328 (Proceedings - 15th International Conference on Computing, CIC 2006).
@inproceedings{4c167451ea6b4b4698f6112294f7c883,
title = "Oblivious Transfer using Elliptic Curves",
abstract = "We introduce the idea of Oblivious Transfer to Elliptic Curve Cryptography (ECC), which has the advantage of providing same security with a 160-bit key compared to 1024-bit key needed by RSA. Oblivious Transfer forms the basis of numerous protocols which can all now be analogously developed in ECC using the algorithm we present in this paper. Also, we look into one of its important applications known as chosen one-out-of-two Oblivious Transfer and present a protocol for it using the algorithm we discuss.",
author = "Abhishek Parakh",
year = "2006",
month = "12",
day = "1",
doi = "10.1109/CIC.2006.49",
language = "English (US)",
isbn = "0769527086",
series = "Proceedings - 15th International Conference on Computing, CIC 2006",
pages = "323--328",
booktitle = "Proceedings - 15th International Conference on Computing, CIC 2006",

}

TY - GEN

T1 - Oblivious Transfer using Elliptic Curves

AU - Parakh, Abhishek

PY - 2006/12/1

Y1 - 2006/12/1

N2 - We introduce the idea of Oblivious Transfer to Elliptic Curve Cryptography (ECC), which has the advantage of providing same security with a 160-bit key compared to 1024-bit key needed by RSA. Oblivious Transfer forms the basis of numerous protocols which can all now be analogously developed in ECC using the algorithm we present in this paper. Also, we look into one of its important applications known as chosen one-out-of-two Oblivious Transfer and present a protocol for it using the algorithm we discuss.

AB - We introduce the idea of Oblivious Transfer to Elliptic Curve Cryptography (ECC), which has the advantage of providing same security with a 160-bit key compared to 1024-bit key needed by RSA. Oblivious Transfer forms the basis of numerous protocols which can all now be analogously developed in ECC using the algorithm we present in this paper. Also, we look into one of its important applications known as chosen one-out-of-two Oblivious Transfer and present a protocol for it using the algorithm we discuss.

UR - http://www.scopus.com/inward/record.url?scp=45149131444&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=45149131444&partnerID=8YFLogxK

U2 - 10.1109/CIC.2006.49

DO - 10.1109/CIC.2006.49

M3 - Conference contribution

SN - 0769527086

SN - 9780769527086

T3 - Proceedings - 15th International Conference on Computing, CIC 2006

SP - 323

EP - 328

BT - Proceedings - 15th International Conference on Computing, CIC 2006

ER -