In this article, we introduce a new concept of oblivious transfer with membership verification that allows any legitimate group users to obtain services from a service provider in an oblivious manner. We present two oblivious transfer with membership verification schemes, differing in design. In the first scheme, a trusted group manager issues credentials for a pre-determined group of users so that the group of users with a valid group credential can obtain services from the service provider, while the choices made by group users remain oblivious to the service provider. The second scheme avoids the trusted group manager, which allows any user in the group to be a group manager, thus it is more suitable in distributed systems. In particular, we prove that the two oblivious transfer with membership verification schemes can achieve receiver’s privacy and sender’s privacy under a half-simulation model.
Introduction
It is a well-known economic strategy that the service providers are usually willing to sell their goods or services to a group of users with a discount price to attract customers. The more people who make a batch buy, the better prices the service providers are willing to offer. In addition to a good price, the customer’s privacy should be protected when buying goods or services from the service providers. With this motivation in mind, we aim to design oblivious transfer with membership verification schemes (MV-OT), which ensure that (1) user’s privacy (e.g. consumption transcript) is hidden from the service provider, (2) only legitimate group users can obtain services from the service provider, and (3) the proposed MV-OT schemes should incur same computation and communication costs as conventional oblivious transfer with access control schemes.
To see whether MV-OT is useful in practice, we consider a scenario where an issuer (group manager) forms a group which includes certain number of users wanting to purchase digital goods or services from a service provider. After forming a group of users, the issuer first generates the group credential for all users. Next, the issuer registers the group with a service provider, who will verify whether the real number of users in the group is in accordance with the claimed number. After a successful authentication with the service provider, a valid group user can acquire the digital goods or services obliviously.
We stress that designing MV-OT schemes is a non-trivial task. The straightforward way to achieve MV-OT is to combine a broadcast encryption or a membership encryption scheme with a conventional oblivious transfer with access control scheme.1,2 The group manager first encrypts the credential and broadcasts the ciphertext to every user in the group, only valid users in the group could obtain the credential, with which the users in the group could acquire services from a sender. However, there are several drawbacks in this straightforward combination. First, the combined algorithm inherits the computation and storage costs of two independent algorithms. Second, every user in the group has to share the same credential, which means if a dispute happens, even the group manager cannot decide which user should be accused. Third, a straightforward combination of two different algorithms may lead to new security issues.
Our contributions
We formulate the concept of MV-OT and present two concrete MV-OT schemes that can be applied in different applications. In the first scheme, a central authority first forms a group of users willing to make a batch buy from a service provider (or sender). The central authority generates credentials for group users and group token which is sent to the sender. The sender encrypts the digital contends with the group token to ensure only group users with valid credentials can acquire the digital goods or services successfully. The users outside the group cannot gain any information transmitted between the sender and the valid users in the group. In the second scheme, we remove the central authority to make it much more suitable in distributed applications. Any member in the group or even the sender can play the role of an issuer to generate group information.
It is worth noticing that the proposed schemes achieve privacy as well as membership verification without involving too much computation and communication costs. The comprehensive efficiency analysis of the proposed schemes shows that our proposed schemes just involve few extra computation and communication costs compared with the oblivious transfer with access control schemes in Han et al.,
1
which makes the proposed MV-OT schemes applicable in many distributed systems such as ad hoc mobile networks.
Related works
Oblivious transfer
Oblivious transfer has been applied widely in secure multiparty computation,
3
digital content browsing,
4
exchange of secrets
5
and other privacy-preserving systems.1,2,6,7 Oblivious transfer has received much attention since it was first proposed by Rabin.
5
In the early works,5,8 the sender can only one message
obliviously, which was soon extended to a more general k-out-of-n setting by Brassard et al.,
9
where a receiver could choose
messages obliviously from a sender. To ensure only legitimate receivers obtain contents from a receiver, Coull et al.
10
proposed an oblivious transfer scheme with access control using state graphs, where the receivers in the system can only acquire contents successfully from a sender if he has some unused states. Liu et al.
11
proposed the concept of traceable oblivious transfer such that the privacy of users is treated separately. The privacy of the honest receivers is well-protected while the privacy of the dishonest receivers could be traced by the sender.
Broadcast encryption
The concept of broadcast encryption was proposed by Fiat and Naor.
12
Broadcast encryption enables one broadcaster to transmit messages to a dynamically chosen group of users
such that
, where
refers to the set of all the users having access to the broadcast channel. Fiat and Naor
12
presented the first symmetric-key-based broadcast encryption scheme and the corresponding security model, which was extended to the public key setting by Dodis and Fazio.
13
Recently, Gritti et al.
14
proposed a novel broadcast encryption with dealership scheme which enables certain “dealers” in the broadcast system first to make a bulk buy from the broadcaster and then resell them in their own groups. Broadcast encryption with dealership accommodates a new business opportunity model and has received lots of attention.15,16 Broadcast encryption can provide group membership verification; however, the “dealer” can trace the contents purchased by the users in the group, which in turn violates the privacy requirements in the aforementioned scenario.
Membership proof and membership encryption
Membership proof17–20 is a very useful cryptographic primitive such that a user can prove to a verifier in a privacy-preserving manner that an attribute
belongs to a group
. Membership proof protocols can be further divided into two categories according to the information that can be accessed by the verifier. In the first category,19,20 the verifier has knowledge of a token
on a single attribute and all the attributes in
. The prover can convince the verifier that
without letting the verifier know which attribute it is in the group. In the second category,17,18 the verifier has access to an attribute
and the group token
containing information on a set of attributes. The prover can convince the verifier that
without leaking information of other attributes in the group. Membership encryption is proposed by Guo et al.21,22 as a useful alternative primitive of membership proof. It employs the privacy-preserving group token
in Au et al.
17
such that given
, it is computationally difficult to know the attributes or identities in
; however, a success decryption requires that a user holds the membership
.
Secret handshake
Secret handshake23–25 is a useful primitive that can be applied in privacy-preserving applications where group membership verification is indispensable. The concept of secret handshake was introduced by Balfanz et al.,
23
which enables some entities in the same group to authenticate each other anonymously without leaking private information. Later on, Xu and Yung
24
proposed a secret handshake scheme achieving k-unlikability, which means an adversary can only infer that the participant is one out of the
users in the group. Recently, Tian et al.
25
proposed a k-time secret handshake scheme that allows valid users in a group to authenticate each other up to
times with a group credential. Otherwise, the private information can be traced in public. To achieve group membership verification, secret handshake schemes require that the service provider has to stay within the same group with all the users, which is impractical for the setting mentioned in the aforementioned scenario.
Article organization
The rest of the article is organized as follows. We introduce the formal definition and the security model of MV-OT in section “Security model.” Some preliminaries are presented in section “Preliminaries,” and concrete MV-OT schemes are presented in section “Our proposed schemes.” We prove their security and analyze their efficiency in section “Security analysis,” and the article is concluded in section “Conclusion.”
Security model
In this section, we present the formal definition and the security model for MV-OT schemes.
Definition
There are three entities in an MV-OT system, namely, a receiver, a sender, and an issuer who behaves on behalf of a group manager. We assume there exists a public key infrastructure (PKI) that issues certificates on users’ public keys. First, the issuer forms a group containing the users willing to obtain services from the sender. Then, the issuer generates the group token and sends it to the sender via a secure channel. The issuer generates credentials for each user in the group, with which the user (i.e. the receiver) could obtain services or digital goods from the sender. The system consists of four algorithms as follows:
1. Setup. Taking as input of a security parameter
, the Setup algorithm outputs the system public parameters
2. KeyGen. Taking as input of the system parameters
, the KeyGen generates the public key pairs for the senders, receivers, and issuer, respectively, in the system
3. GroupGen. Taking as input of the systems parameters
, pseudonyms of
users
, and the private key of the issuer, it returns the credential for the receivers and group token for the sender
4. Commitment. Taking as input of the group token
and the system parameter
, the Commitment algorithm outputs
ciphertexts
5. Transfer. The polynomial probabilistic time algorithm Transfer is an interactive algorithm between a receiver
and the sender
. The result of this algorithm is that the receiver with pseudonym
obtains the intended message while the sender
records a transcript on
choice
6. Correctness. We require that for any security parameter
, if
,
,
,
,
,
, and
, then the receiver can obtain the intended message
Security model
The security model presented in this section follows the half-simulation model in Naor and Pinkas.
26
We define that an MV-OT scheme is secure if the following conditions hold:
Receiver’s privacy. The sender
cannot obtain any information about the receiver’s choices. To be specific, for any two different choice sets
and
, the corresponding transcripts
and
are indistinguishable if the corresponding messages
and
are identically distributed.
Sender’s privacy. A valid receiver
cannot obtain any information other messages
other than the intended contents. The security of the sender is defined through the real-world/ideal-world paradigm. In the real world, the sender and the receiver execute the protocols following the algorithm. In the ideal world, the protocol is executed with a trusted third party (TTP). The sender sends all the messages
to the TTP, where the receiver acquires the intended choices
adaptively. If
, then TTP sends
to the receiver. An MV-OT scheme is said to provide the privacy of the sender if for any receiver
in real world, there exists a probabilistic polynomial time (PPT)
such that the outputs of
and
are indistinguishable.
Semantic security. If a receiver
does not have a valid group credential
, she cannot obtain any useful information
from the sender
.
Preliminaries
Bilinear pairing
Let
and
be multiplicative cyclic groups with prime order
. Let
and
be generators of
. A bilinear map
satisfies the following conditions:
Bilinearity:
for all
and
.
No-degeneracy:
, where
is the identity in
.
Computability: there is an efficient algorithm to compute
for all
.
Complexity assumptions
Definition 1
Discrete logarithm (DL) assumption. Let
be a cyclic group with a prime order
and
be a generator of
. Given a random element
, compute
such that
. Let
be the advantage of a PPT adversary. We say that DL assumption holds in
that for all PPT adversary
, the following function
is negligible
Definition 2
One-generator l-strong Diffie–Hellman (l-SDH) assumption.
27
Let
be a bilinear group, for a randomly chosen element
and a random generator
, the l-SDH problem is, given
, to compute a pair
. Define the advantage of a PPT adversary as
, and we say the l-SDH assumption holds if for all PPT algorithm
, the following function
is negligible
Definition 3
Extended chosen-target computational Diffie–Hellman (XCT-CDH) assumption.
1
Let
be a cyclic group with prime order
and
, there is a help oracle
that takes
as input and returns
. Given a
tuple
, where
for
, define the advantage
of a PPT adversary
, and XCT-CDH assumption holds in
, if for all PPT adversary
that
is negligible
where
, for all
.
Our proposed schemes
In this section, we present two MV-OT schemes. In the first scheme, there is an issuer generating credentials for the members in the group. Our construction takes advantage of the techniques of accumulator scheme in Nguyen.
18
In the first proposed scheme, the system parameters contain two secret keys
and some auxiliary parameters
. While the group token is
, the membership verification process is described as follows:
1. If user
is a valid group user with credential
, then it would be computationally easy to recover
which is further used to extract the intended message.
2. Otherwise, if a dishonest user
who does not belong to the group tries to interact with the sender, we have
which contains the inversion exponent
that is computationally infeasible to be computed from the system parameters.
MV-OT
-I
The proposed scheme consists of a tuple of PPT algorithms as follows:
Setup. Taking as input a security parameter
, this algorithm outputs a bilinear group
where
and
are cyclic groups with prime
. Let
be a generator of
. The system parameters
.
KeyGen. Suppose there are
users with pseudonyms
in the group, the issuer (i.e. group manager) chooses
and computes
and generates the group token
, where
is chosen at random by the issuer. For each user with pseudonym
, the issuer computes
and returns it to the individual users.
sends
to the sender
.
Commitment. in response to the requirement from a user with pseudonym
,
chooses
different random elements
and a one-time secret
,
computes the ciphertext of
as
where
and
,
sends
to
.
Transfer. Upon receiving the ciphertexts from the sender, the receiver with pseudonym
chooses
and computes
,
, where
, then the receiver
sends
to
.
computes
and sends it to
.
computes
and obtains the intended message
.
Correctness
Suppose the receiver with pseudonym
is a valid group member with credential
. The correctness check of MV-OT
-II scheme is as follows
and
MV-OT
-II
In the MV-OT
-I scheme, it involves a central authority named issuer helps to form and maintain the group, which makes it unpractical in distributed scenarios. Therefore, we proposed the second scheme MV-OT
-II without a central authority. Anyone who tries to make a batch buy or even the sender could behave as the group manager to initialize the system. The proposed MV-OT
-II scheme consists of a tuple of PPT algorithms as follows:
Setup. Taking as input a security parameter
, this algorithm outputs a bilinear group
where
and
are cyclic groups with prime
. Let
and
be generators of
and
, respectively. The system parameters
.
KeyGen. Suppose there is an initial setup phase and there have been
users with pseudonyms
in the group. The sender chooses
and computes
and generates the group token
, where
is randomly chosen by the sender. For each user with pseudonym
, the sender computes and returns
.
Commitment. In response to the requirement from a user with pseudonym
.
chooses
different random numbers
and a one-time secret
.
computes the ciphertext of
as
where
and
.
sends
to
.
Transfer. Upon receiving ciphertexts from the sender,
chooses
and computes
and
, where
is the index of message of the receiver’s choice and
, then the receiver
sends
to
.
computes
and sends it to
.
computes
and obtains the intended message
.
Correctness
Suppose the receiver with pseudonym
is valid group member with credential
. The correctness check of MV-OT
-II scheme is as follows
and
Security analysis
Security analysis
The security result of our MV-OT schemes is shown by the following theorems.
Theorem 1
The proposed MV-OT
-I scheme provides receiver’s privacy for honest receivers.
Proof
Suppose an honest receiver with pseudonym
requests contents from the sender.
is a set of transcripts on
choices. For any
such that
,
. Set
, then there exits
such that
, where
and
, which means the choice of the receiver is computationally indistinguishable to the sender as long as the DL problem is hard in
.
Theorem 2
The proposed MV-OT
-I scheme provides sender’s privacy.
Proof
Suppose an honest receiver runs the MV-OT protocol with the sender
to obtain
messages. For any PPT malicious receiver
in the real world, we are able to construct a PPT malicious receiver
in the ideal model such that the outputs of
and
are indistinguishable.
simulates the honest sender
in the real world and interacts with
as follows:
sends the messages
to the
.
sends
to
such that
for
, where
are
different pairs of random numbers selected from
and
by
.
monitors the outputs of
, if
can compute
and
.
chooses random
and
.
When
requires
from
,
queries the help oracle
on
and gets back
, where
,
.
If
can compute
,
sends
to
,
returns
.
outputs
.
In the simulation process, if
obtains
messages while
is unaware of the indices of the corresponding messages, the simulation aborts. Otherwise, we are able to show that
is only able to choose at most
messages under the XCT-CDH assumption. If
can get
messages, he can compute
for
. That is, if
can obtain
can compute
which contradicts the XCT-CDH assumption. Therefore,
can only obtain the required messages from the sender and cannot obtain any information on other messages that he hasn’t required.
We can see from Theorem 1 that
and
are indistinguishable from random elements in
and
are indistinguishable from random elements in
by Theorem 3. In addition, the sets of
and
are identically distributed. Therefore, no distinguishers can distinguish the outputs of
and
with a non-negligible probability.
Theorem 3
The proposed MV-OT
scheme is semantic secure.
Proof
The semantic security of MV-OT
-I is analyzed through two aspects. First, if the adversary
could forge
, then
could act as authorized receiver to communicate with the sender. In this case, there exists another PPT algorithm
that could use
to break l-SDH assumption. Second, if the adversary
could compute
from the ciphertext
, then
could also obtain messages from the receiver. In this case, there exists a PPT algorithm that could take advantage of
to break the XCT-CDH assumption. Therefore, MV-OT
-I is semantically secure.
Theorem 4
The proposed MV-OT
-II scheme provides receiver’s privacy for honest receivers. The security proof and the subsequent proofs of the MV-OT
-II scheme are similar as that for MV-OT
-I, thus we omit it.
Theorem 5
The proposed MV-OT
-II scheme provides sender’s privacy.
Theorem 6
The proposed MV-OT
-II scheme is semantic secure.
Efficiency analysis
We present a comprehensive complexity analysis in terms of computation and communication costs. The results are presented in Tables 1 and 2, respectively. By
,
, and
, we denote the number of users in the group, the total number of the messages, and the number of messages selected by a receiver. Let
and
denote the exponential operations in
and
, and
one pairing operation.
Conclusion
In this article, we formulate the concept of MV-OT such that only legitimate users with proper membership can obliviously acquire digital goods or services from a service provider. We have proposed two MV-OT schemes with completed security analysis. The two MV-OT schemes are different in design, and the one without trusted group manager is preferable in distributed systems.