Oblivious transfer

Results: 121



#Item
21

Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents Vandana Gunupudi1 and Stephen R. Tate2 1

Add to Reading List

Source URL: www.uncg.edu

Language: English - Date: 2009-10-01 13:53:25
    22

    Unconditionally Secure Oblivious Transfer from Real Network Behavior Paolo Palmieri1,? and Olivier Pereira2 1 Delft University of Technology, Parallel and Distributed Systems Group

    Add to Reading List

    Source URL: www.uclouvain.be

    Language: English - Date: 2013-09-12 08:50:47
      23Cryptography / Secure multi-party computation / Secure two-party computation / Communication complexity / Commitment scheme / Oblivious transfer / Cryptographic protocol / XTR / Transmission Control Protocol

      Covert Two-Party Computation Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PANicholas Hopper

      Add to Reading List

      Source URL: hunch.net

      Language: English - Date: 2005-03-01 11:04:04
      24Cryptography / Private information retrieval / Oblivious transfer / VEST / Power dividers and directional couplers / Cryptographic primitive / Block cipher / Pir / X Window System / Commitment scheme

      LNCSOn Robust Combiners for Private Information Retrieval and Other Primitives

      Add to Reading List

      Source URL: dcg.ethz.ch

      Language: English - Date: 2014-09-26 08:36:31
      25

      Motivation Efficient Priced Oblivious Transfer Optimistic Fair POT Optimistic Fair Priced Oblivious Transfer A. Rial

      Add to Reading List

      Source URL: 2010.africacrypt.com

      Language: English - Date: 2010-05-03 07:27:44
        26

        LNCSImplementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering

        Add to Reading List

        Source URL: www.uclouvain.be

        Language: English - Date: 2012-11-06 12:30:22
          27

          A conference version of part of this work appeared at the proceedings of ISITCommitment and Oblivious Transfer in the Bounded Storage Model with Errors Rafael Dowsley1

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-09-30 08:45:56
            28

            Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents Vandana Gunupudi1 and Stephen R. Tate2 1

            Add to Reading List

            Source URL: nsl.cse.unt.edu

            Language: English - Date: 2012-01-12 18:51:22
              29Cryptography / Zero-knowledge proof / Commitment scheme / IP / Internet privacy / Secure multi-party computation / Privacy / FiatShamir heuristic / Oblivious transfer / Soundness / Private information retrieval / NP

              Privacy-Preserving Observation in Public Spaces Florian Kerschbaum1 and Hoon Wei Lim2 1 SAP Karlsruhe, Germany

              Add to Reading List

              Source URL: www.fkerschbaum.org

              Language: English - Date: 2015-06-23 05:52:39
              30

              Efficient Oblivious Transfer in the Bounded-Storage Model Dowon Hong, Ku-Young Chang, and Heuisu Ryu Information Security Research Division, ETRI 161 Gajeong-Dong, Yuseong-Gu, Daejeon, , KOREA {dwhong,jang1090,hsr

              Add to Reading List

              Source URL: www.iacr.org

              Language: English - Date: 2007-08-31 13:50:32
                UPDATE