Sciweavers

1087 search results - page 2 / 218
» Distributed Oblivious Transfer
Sort
View
ASIACRYPT
2003
Springer
13 years 8 months ago
Verifiable Homomorphic Oblivious Transfer and Private Equality Test
We describe slightly modified version (that we call the HOT protocol) of the Aiello-Ishai-Reingold oblivious transfer protocol from
Helger Lipmaa
CIS
2004
Springer
13 years 10 months ago
General Public Key m-Out-of-n Oblivious Transfer
Abstract. In the m-out-of-n oblivious transfer model, Alice has n messages, Bob has m choices. After the interaction between the two parties, Bob can get m but only m messages from...
Zhide Chen, Hong Zhu
EUROCRYPT
2006
Springer
13 years 8 months ago
Oblivious Transfer Is Symmetric
We show that oblivious transfer of bits from A to B can be obtained from a single instance of the same primitive from B to A. Our reduction is perfect and shows that oblivious tran...
Stefan Wolf, Jürg Wullschleger
IWSEC
2009
Springer
13 years 11 months ago
Reducing Complexity Assumptions for Oblivious Transfer
Reducing the minimum assumptions needed to construct various cryptographic primitives is an important and interesting task in theoretical cryptography. Oblivious Transfer, one of ...
K. Y. Cheong, Takeshi Koshiba
CTRSA
2008
Springer
111views Cryptology» more  CTRSA 2008»
13 years 6 months ago
Efficient Fully-Simulatable Oblivious Transfer
Oblivious transfer, first introduced by Rabin, is one of the basic building blocks of cryptographic protocols. In an oblivious transfer (or more exactly, in its 1-out-of-2 variant...
Andrew Y. Lindell