Oblivious transfer

Results: 121



#Item
31Cryptography / Public-key cryptography / Attribute-based encryption / RSA / Ciphertext indistinguishability / Encryption / Key / Authenticated encryption / PERMIS / Ciphertext

Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2

Add to Reading List

Source URL: www.e7n.ch

Language: English
32Oblivious transfer / Secure multi-party computation / Information-theoretic security / Secret sharing / Distributed computing / Indocrypt / Commitment scheme / Asynchronous system / Cryptography / Cryptographic protocols / Verifiable secret sharing

Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2012-09-07 07:03:05
33Secure multi-party computation / Secure two-party computation / IP / Oblivious transfer / PP / Communications protocol / Communication complexity / RSA / Security parameter / Cryptography / Theoretical computer science / Cryptographic protocols

An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-07-21 08:57:56
34Oblivious transfer / Asiacrypt / International Cryptology Conference / Algorithmic Number Theory Symposium / Cryptography / Proxy re-encryption / Lecture Notes in Computer Science

Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2013-09-11 11:45:30
35Secure two-party computation / Zero-knowledge proof / Commitment scheme / Oblivious transfer / Computational indistinguishability / Oded Goldreich / Ciphertext indistinguishability / Man-in-the-middle attack / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Secure Two-Party Protocols: Techniques and Constructions

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 07:30:08
36Secure two-party computation / Oblivious transfer / Alice and Bob / Cryptography / Cryptographic protocols / Secure multi-party computation

Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan Katz

Add to Reading List

Source URL: u.cs.biu.ac.il

Language: English - Date: 2012-02-29 01:45:21
37Cryptography / Commitment scheme / Channel / Data / Noisy-channel coding theorem / Transmission Control Protocol / Information theory / Telecommunications engineering / Information

Unfair Noisy Channels and Oblivious Transfer Ivan Damg˚ ard1 , Serge Fehr2? , Kirill Morozov1, and Louis Salvail1?? BRICS? ? ? , FICS † , Aarhus University, Denmark {ivan,kirill,salvail}@brics.dk ACAC‡ , Department

Add to Reading List

Source URL: imi.kyushu-u.ac.jp

Language: English - Date: 2003-12-16 03:09:30
38RSA / ElGamal encryption / Diffie–Hellman key exchange / Homomorphic encryption / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptography / Public-key cryptography / Cryptographic protocols

An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2013-02-05 01:02:43
39

ISIT 2006, Seattle, USA, July, 2006 On the Oblivious Transfer Capacity of the Erasure Channel ∗

Add to Reading List

Source URL: imi.kyushu-u.ac.jp

Language: English - Date: 2007-02-07 16:48:42
    40Computational complexity theory / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Secure two-party computation / Paillier cryptosystem / Oblivious transfer / Zero-knowledge proof / Communication complexity / Cryptography / Cryptographic protocols / Public-key cryptography

    Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2010-11-25 08:58:28
    UPDATE