An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy

被引:0
|
作者
Hoda Jannati
Behnam Bahrak
机构
[1] Institute for Research in Fundamental Sciences (IPM),School of Computer Science
[2] University of Tehran,Department of Electrical and Computer Engineering
来源
Wireless Personal Communications | 2017年 / 97卷
关键词
Elgamal encryption; Location based query; Location privacy; Oblivious transfer; Private information retrieval;
D O I
暂无
中图分类号
学科分类号
摘要
Location based services (LBS) are applications that require a client’s geographical location to provide a service or a piece of information that is related to the client at that location. Although LBSs promise safety and convenience, they threaten the privacy of their clients in different ways. In 2014, Paulet et al. proposed a variant of 1-out-of-L oblivious transfer protocol based on Elgamal encryption to be employed on location based queries not only for preserving the client’s location privacy but also for protecting an LBS server’s database security. In other words, they claim that using their protocol, the server cannot determine a client’s location, and the clients can only obtain the block of data that is intended to be accessed by them. In this paper, we show that the oblivious transfer protocol proposed by Paulet et al. is not able to protect the security of the LBS server’s database. We also suggest an improvement to this protocol to strengthen it against the aforementioned vulnerability. The improved protocol protects both client’s location privacy and the server’s database security, at the cost of slight performance degradation.
引用
收藏
页码:3113 / 3123
页数:10
相关论文
共 50 条
  • [1] An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy
    Jannati, Hoda
    Bahrak, Behnam
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 3113 - 3123
  • [2] A Location Privacy-Preserving Protocol Based on Homomorphic Encryption and Key Agreement
    Zhu, Xiaoling
    Lu, Yang
    Zhu, Xiaojuan
    Qiu, Shuwei
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 54 - 59
  • [3] A privacy-preserving digital rights management protocol based on oblivious transfer scheme
    Jiang Y.
    Yang B.
    International Journal of Digital Content Technology and its Applications, 2011, 5 (05) : 337 - 341
  • [4] A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM
    Kane, Seyni
    Bkakria, Anis
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVIII, DBSEC 2024, 2024, 14901 : 101 - 108
  • [5] A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer
    Rial, Alfredo
    Balasch, Josep
    Preneel, Bart
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 202 - 212
  • [6] Location Privacy Preserving Scheme Based on Attribute Encryption
    Lin, Xi
    Han, Yiliang
    Ke, Yan
    Yang, Xiaoyuan
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 164 - 177
  • [7] Application of oblivious transfer protocol in distributed data mining with privacy-preserving
    Wang, Weiping
    Deng, Bing
    Li, Zhepeng
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 283 - 285
  • [8] Unconditional Security and Privacy Preserving Oblivious Transfer
    Ghodosi, Hossein
    Lee, Ickjai
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 1042 - 1047
  • [9] A Privacy-Preserving Method Based on Server-Aided Reverse Oblivious Transfer Protocol in MCS
    Long, Hao
    Zhang, Shukui
    Zhang, Yang
    Zhang, Li
    Wang, Jin
    IEEE ACCESS, 2019, 7 : 164667 - 164681
  • [10] A location-based privacy-preserving oblivious sharing scheme for indoor navigation
    Yang, Huijie
    Vijayakumar, Pandi
    Shen, Jian
    Gupta, Brij B.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 137 : 42 - 52