Sciweavers

20 search results - page 2 / 4
» Simulatable Adaptive Oblivious Transfer
Sort
View
ASIACRYPT
2007
Springer
13 years 11 months ago
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Spring...
Matthew Green, Susan Hohenberger
CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 5 months ago
A Framework For Fully-Simulatable h-Out-Of-n Oblivious Transfer
Bing Zeng, Xueming Tang, Chingfang Hsu
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
14 years 6 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
14 years 6 months ago
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be st...
Yehuda Lindell, Hila Zarosim
ASIACRYPT
2008
Springer
13 years 7 months ago
Universally Composable Adaptive Oblivious Transfer
In an oblivious transfer (OT) protocol, a Sender with messages M1, . . . , MN and a Receiver with indices 1, . . . , k [1, N] interact in such a way that at the end the Receiver ...
Matthew Green, Susan Hohenberger