{"title":"云计算中一种新的基于密文的OT协议","authors":"Xiaopeng Zhu, Yong Wu, Xiaodong Li, Jianyi Zhang","doi":"10.1109/AINIT59027.2023.10212517","DOIUrl":null,"url":null,"abstract":"Cloud computing is the on-demand availability of computer system resources, especially computing power. Cloud computing relies on sharing resources to achieve coherence, and it needs to communicate frequently with the user. In addition, the user's information must be kept secret from the cloud, and additional computing information in the cloud should also be kept private from the user. The problem can be solved with oblivious transfer. Oblivious transfer (OT) protocols are an essential part of secure multi-party computation in cryptography. However, the previous scheme of OT is inefficient. When messages need to be transmitted multiple times, it becomes challenging to use in protecting privacy data transfer for cloud computing. In this paper, we analyze the features of cloud computing and the former OT protocols based on public key encryption (PKE) and Diffie-Hellman (DH). We propose a new OT protocol strategy, which uses a function in the ciphertext. We map the obtained symmetric public key and reduce computation for the protocol based on DH. We provide an implementation on cloud computing and compare our protocols with well-known OTs. In cloud computing, it shows that the time for each OT is almost negligible. In addition, the experimental results show that our protocol is at least 24% to 40% more efficient than other protocols. On the premise of ensuring user privacy, our strategy can make cloud data transmission more efficient.","PeriodicalId":276778,"journal":{"name":"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"443 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A new ciphertext based OT protocol in cloud computing\",\"authors\":\"Xiaopeng Zhu, Yong Wu, Xiaodong Li, Jianyi Zhang\",\"doi\":\"10.1109/AINIT59027.2023.10212517\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is the on-demand availability of computer system resources, especially computing power. Cloud computing relies on sharing resources to achieve coherence, and it needs to communicate frequently with the user. In addition, the user's information must be kept secret from the cloud, and additional computing information in the cloud should also be kept private from the user. The problem can be solved with oblivious transfer. Oblivious transfer (OT) protocols are an essential part of secure multi-party computation in cryptography. However, the previous scheme of OT is inefficient. When messages need to be transmitted multiple times, it becomes challenging to use in protecting privacy data transfer for cloud computing. In this paper, we analyze the features of cloud computing and the former OT protocols based on public key encryption (PKE) and Diffie-Hellman (DH). We propose a new OT protocol strategy, which uses a function in the ciphertext. We map the obtained symmetric public key and reduce computation for the protocol based on DH. We provide an implementation on cloud computing and compare our protocols with well-known OTs. In cloud computing, it shows that the time for each OT is almost negligible. In addition, the experimental results show that our protocol is at least 24% to 40% more efficient than other protocols. On the premise of ensuring user privacy, our strategy can make cloud data transmission more efficient.\",\"PeriodicalId\":276778,\"journal\":{\"name\":\"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)\",\"volume\":\"443 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AINIT59027.2023.10212517\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINIT59027.2023.10212517","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A new ciphertext based OT protocol in cloud computing
Cloud computing is the on-demand availability of computer system resources, especially computing power. Cloud computing relies on sharing resources to achieve coherence, and it needs to communicate frequently with the user. In addition, the user's information must be kept secret from the cloud, and additional computing information in the cloud should also be kept private from the user. The problem can be solved with oblivious transfer. Oblivious transfer (OT) protocols are an essential part of secure multi-party computation in cryptography. However, the previous scheme of OT is inefficient. When messages need to be transmitted multiple times, it becomes challenging to use in protecting privacy data transfer for cloud computing. In this paper, we analyze the features of cloud computing and the former OT protocols based on public key encryption (PKE) and Diffie-Hellman (DH). We propose a new OT protocol strategy, which uses a function in the ciphertext. We map the obtained symmetric public key and reduce computation for the protocol based on DH. We provide an implementation on cloud computing and compare our protocols with well-known OTs. In cloud computing, it shows that the time for each OT is almost negligible. In addition, the experimental results show that our protocol is at least 24% to 40% more efficient than other protocols. On the premise of ensuring user privacy, our strategy can make cloud data transmission more efficient.