Sciweavers

12 search results - page 3 / 3
» crypto 1995
Sort
View
CRYPTO
1995
Springer
135views Cryptology» more  CRYPTO 1995»
13 years 10 months ago
Committed Oblivious Transfer and Private Multi-Party Computation
Abstract. In this paper we present an eficient protocol for “Committed Oblivious Transfer” to perform oblivious transfer on committed bits: suppose Alice is committed to bits 0...
Claude Crépeau, Jeroen van de Graaf, Alain ...
CRYPTO
2000
Springer
157views Cryptology» more  CRYPTO 2000»
13 years 10 months ago
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
Private information retrieval (PIR) enables a user to retrieve a data item from a database, replicated among one or more servers, while hiding the identity of the retrieved item. ...
Amos Beimel, Yuval Ishai, Tal Malkin