Oblivious Transfer using Elliptic Curves

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

We introduce the idea of Oblivious Transfer to Elliptic Curve Cryptography (ECC), which has the advantage of providing same security with a 160-bit key compared to 1024-bit key needed by RSA. Oblivious Transfer forms the basis of numerous protocols which can all now be analogously developed in ECC using the algorithm we present in this paper. Also, we look into one of its important applications known as chosen one-out-of-two Oblivious Transfer and present a protocol for it using the algorithm we discuss.

Original languageEnglish (US)
Title of host publicationProceedings - 15th International Conference on Computing, CIC 2006
Pages323-328
Number of pages6
DOIs
StatePublished - 2006
Event15th International Conference on Computing, CIC 2006 - Mexico City, Mexico
Duration: Nov 21 2006Nov 24 2006

Publication series

NameProceedings - 15th International Conference on Computing, CIC 2006

Conference

Conference15th International Conference on Computing, CIC 2006
CountryMexico
CityMexico City
Period11/21/0611/24/06

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Oblivious Transfer using Elliptic Curves'. Together they form a unique fingerprint.

  • Cite this

    Parakh, A. (2006). Oblivious Transfer using Elliptic Curves. In Proceedings - 15th International Conference on Computing, CIC 2006 (pp. 323-328). [4023828] (Proceedings - 15th International Conference on Computing, CIC 2006). https://doi.org/10.1109/CIC.2006.49