Oblivious transfer

Results: 121



#Item
31Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2

Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2

Add to Reading List

Source URL: www.e7n.ch

Language: English
32Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2012-09-07 07:03:05
33An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-07-21 08:57:56
34Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2013-09-11 11:45:30
35Efficient Secure Two-Party Protocols: Techniques and Constructions

Efficient Secure Two-Party Protocols: Techniques and Constructions

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 07:30:08
36Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan Katz

Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan Katz

Add to Reading List

Source URL: u.cs.biu.ac.il

Language: English - Date: 2012-02-29 01:45:21
37Unfair Noisy Channels and Oblivious Transfer Ivan Damg˚ ard1 , Serge Fehr2? , Kirill Morozov1, and Louis Salvail1?? BRICS? ? ? , FICS † , Aarhus University, Denmark {ivan,kirill,salvail}@brics.dk ACAC‡ , Department

Unfair Noisy Channels and Oblivious Transfer Ivan Damg˚ ard1 , Serge Fehr2? , Kirill Morozov1, and Louis Salvail1?? BRICS? ? ? , FICS † , Aarhus University, Denmark {ivan,kirill,salvail}@brics.dk ACAC‡ , Department

Add to Reading List

Source URL: imi.kyushu-u.ac.jp

Language: English - Date: 2003-12-16 03:09:30
38An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2013-02-05 01:02:43
39ISIT 2006, Seattle, USA, July, 2006  On the Oblivious Transfer Capacity of the Erasure Channel ∗

ISIT 2006, Seattle, USA, July, 2006 On the Oblivious Transfer Capacity of the Erasure Channel ∗

Add to Reading List

Source URL: imi.kyushu-u.ac.jp

Language: English - Date: 2007-02-07 16:48:42
    40Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim†  November 25, 2010

    Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2010-11-25 08:58:28