Sciweavers

55 search results - page 1 / 11
» Mobile Agent Security with Efficient Oblivious Transfer
Sort
View
SECRYPT
2007
77views Business» more  SECRYPT 2007»
14 years 11 months ago
Mobile Agent Security with Efficient Oblivious Transfer
Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji
FC
2008
Springer
134views Cryptology» more  FC 2008»
14 years 11 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
ASIACRYPT
2000
Springer
15 years 1 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas
CTRSA
2008
Springer
111views Cryptology» more  CTRSA 2008»
14 years 11 months ago
Efficient Fully-Simulatable Oblivious Transfer
Oblivious transfer, first introduced by Rabin, is one of the basic building blocks of cryptographic protocols. In an oblivious transfer (or more exactly, in its 1-out-of-2 variant...
Andrew Y. Lindell
JUCS
2008
156views more  JUCS 2008»
14 years 9 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng