Oblivious transfer

Results: 121



#Item
91Diffie–Hellman key exchange / Cryptography / Ciphertext indistinguishability / Advantage

Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption∗ Pratish Datta, Ratna Dutta, and Sourav Mukhopadhyay Department of Mathematics Indian Institute of Technology Kharagpur K

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-28 02:48:34
92Ciphertext indistinguishability / Universal composability / Oblivious transfer / Common reference string model / Communications protocol / Secure multi-party computation / Cryptosystem / Cryptography / Cryptographic protocols / Public-key cryptography

A Framework for Efficient and Composable Oblivious Transfer Chris Peikert SRI International Vinod Vaikuntanathan MIT∗

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:10:06
93Type–token distinction / PP / Universal composability / Oblivious transfer / Security token / Proof of knowledge / Oracle machine / Actor model / Cryptography / Cryptographic protocols / Commitment scheme

General Statistically Secure Computation with Bounded-Resettable Hardware Tokens Nico D¨ottling∗1 , Daniel Kraschewski†2 , J¨orn M¨ uller-Quade3 and Tobias Nilges3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 07:08:33
94FEAL / Silvio Micali / Leftover hash lemma / Cryptanalysis / Differential cryptanalysis / Post-quantum cryptography / Small subgroup confinement attack / Group-based cryptography / Cryptography / Cryptographic protocols / Oblivious transfer

References 1. ABA Bank Card Standard, "Management and Use of Personal Information Numbers, " Aids from ABA, Catalog no[removed], American Bankers Association, [removed]ABA Document 4.3, "Key Management Standard," American

Add to Reading List

Source URL: www.ssl.stu.neva.ru

Language: English - Date: 2001-07-17 16:00:00
95Information / Secure multi-party computation / Oblivious transfer / Secure two-party computation / Communications protocol / Lookup table / Transmission Control Protocol / Zero-knowledge proof / One-way function / Cryptographic protocols / Data / Computing

Cryptographic techniques for privacy-preserving data mining Benny Pinkas HP Labs [removed]

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-01-09 00:12:19
96Secure two-party computation / Communication complexity / Oblivious transfer / IP / Communications protocol / Public-key cryptography / Commitment scheme / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

Secure Computation of the kth-Ranked Element Gagan Aggarwal? , Nina Mishra?? , and Benny Pinkas? ? ? Abstract. Given two or more parties possessing large, confidential datasets, we consider the problem of securely comput

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-05-12 12:29:01
97Secure multi-party computation / Communications protocol / Oblivious transfer / Homomorphic encryption / Transmission Control Protocol / Public-key cryptography / Hamming / Port / Cryptography / Cryptographic protocols / Secure two-party computation

Secure Hamming Distance Based Computation and Its Applications Ayman Jarrous and Benny Pinkas University of Haifa Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2009-04-09 09:23:00
98Internet protocols / Data / Private information retrieval / Oblivious transfer / Port / X Window System / Internet privacy / Cryptographic protocols / Computing / Software

Keyword Search and Oblivious Pseudorandom Functions Michael J. Freedman1 , Yuval Ishai2 , Benny Pinkas3 , and Omer Reingold4 1 New York University ([removed])

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-12-05 02:46:25
99Cryptography / Computing / Secure two-party computation / Communications protocol / Commitment scheme / Secure multi-party computation / Oblivious transfer / Port / Transmission Control Protocol / Cryptographic protocols / Data / Information

Secure Computation of Functionalities based on Hamming Distance and its Application to Computing Document Similarity Ayman Jarrous1 and Benny Pinkas2,* 1 2

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2013-09-16 05:33:14
100Cryptographic protocols / Computational complexity theory / IP / Homomorphic encryption / Paillier cryptosystem / Communication complexity / One-way function / Polynomial / Oblivious transfer / Cryptography / Theoretical computer science / Applied mathematics

Efficient Private Matching and Set Intersection Michael J. Freedman1? , Kobbi Nissim2?? , and Benny Pinkas3 1 2

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-05-12 12:29:04
UPDATE