Oblivious transfer

Results: 121



#Item
21Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents Vandana Gunupudi1 and Stephen R. Tate2 1

Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents Vandana Gunupudi1 and Stephen R. Tate2 1

Add to Reading List

Source URL: www.uncg.edu

Language: English - Date: 2009-10-01 13:53:25
    22Unconditionally Secure Oblivious Transfer from Real Network Behavior Paolo Palmieri1,? and Olivier Pereira2 1  Delft University of Technology, Parallel and Distributed Systems Group

    Unconditionally Secure Oblivious Transfer from Real Network Behavior Paolo Palmieri1,? and Olivier Pereira2 1 Delft University of Technology, Parallel and Distributed Systems Group

    Add to Reading List

    Source URL: www.uclouvain.be

    Language: English - Date: 2013-09-12 08:50:47
      23Covert Two-Party Computation Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PANicholas Hopper

      Covert Two-Party Computation Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PANicholas Hopper

      Add to Reading List

      Source URL: hunch.net

      Language: English - Date: 2005-03-01 11:04:04
      24LNCSOn Robust Combiners for Private Information Retrieval and Other Primitives

      LNCSOn Robust Combiners for Private Information Retrieval and Other Primitives

      Add to Reading List

      Source URL: dcg.ethz.ch

      Language: English - Date: 2014-09-26 08:36:31
      25Motivation Efficient Priced Oblivious Transfer Optimistic Fair POT Optimistic Fair Priced Oblivious Transfer A. Rial

      Motivation Efficient Priced Oblivious Transfer Optimistic Fair POT Optimistic Fair Priced Oblivious Transfer A. Rial

      Add to Reading List

      Source URL: 2010.africacrypt.com

      Language: English - Date: 2010-05-03 07:27:44
        26LNCSImplementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering

        LNCSImplementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering

        Add to Reading List

        Source URL: www.uclouvain.be

        Language: English - Date: 2012-11-06 12:30:22
          27A conference version of part of this work appeared at the proceedings of ISITCommitment and Oblivious Transfer in the Bounded Storage Model with Errors Rafael Dowsley1

          A conference version of part of this work appeared at the proceedings of ISITCommitment and Oblivious Transfer in the Bounded Storage Model with Errors Rafael Dowsley1

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-09-30 08:45:56
            28Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents Vandana Gunupudi1 and Stephen R. Tate2 1

            Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents Vandana Gunupudi1 and Stephen R. Tate2 1

            Add to Reading List

            Source URL: nsl.cse.unt.edu

            Language: English - Date: 2012-01-12 18:51:22
              29Privacy-Preserving Observation in Public Spaces Florian Kerschbaum1 and Hoon Wei Lim2 1 SAP Karlsruhe, Germany

              Privacy-Preserving Observation in Public Spaces Florian Kerschbaum1 and Hoon Wei Lim2 1 SAP Karlsruhe, Germany

              Add to Reading List

              Source URL: www.fkerschbaum.org

              Language: English - Date: 2015-06-23 05:52:39
              30Efficient Oblivious Transfer in the Bounded-Storage Model Dowon Hong, Ku-Young Chang, and Heuisu Ryu Information Security Research Division, ETRI 161 Gajeong-Dong, Yuseong-Gu, Daejeon, , KOREA {dwhong,jang1090,hsr

              Efficient Oblivious Transfer in the Bounded-Storage Model Dowon Hong, Ku-Young Chang, and Heuisu Ryu Information Security Research Division, ETRI 161 Gajeong-Dong, Yuseong-Gu, Daejeon, , KOREA {dwhong,jang1090,hsr

              Add to Reading List

              Source URL: www.iacr.org

              Language: English - Date: 2007-08-31 13:50:32