Oblivious transfer

Results: 121



#Item
51XTR / Secure multi-party computation / Alice and Bob / Diffie–Hellman key exchange / Public-key cryptography / PP / X Window System / Commitment scheme / Cryptography / Cryptographic protocols / Oblivious transfer

One-Round Secure Computation and Secure Autonomous Mobile Agents (Extended Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M¨ uller1 Abstract. This paper investigates one-round secure computation be

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2000-04-12 11:39:28
52Information / Private information retrieval / Database management systems / Internet protocols / Internet standards / Oblivious transfer / Database / Server / Whois / Cryptographic protocols / Computing / Data

Outsourced Private Information Retrieval ∗ Yizhou Huang

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2013-09-04 10:15:18
53Data / Private information retrieval / Information / Database theory / Whois / Oblivious transfer / Database / Server / Cryptographic protocols / Computing / Database management systems

One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries Ryan Henry, Yizhou Huang, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo ON, Canada N2L 3

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-12-11 07:56:46
54Homomorphic encryption / Post-quantum cryptography / Learning with errors / Quantum computer / Zero-knowledge proof / Public-key cryptography / RSA / Random self-reducibility / Oblivious transfer / Cryptography / Lattice-based cryptography / Lattice problem

Cryptography from Post-Quantum Assumptions Raza Ali Kazmi Doctor of Philosophy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-18 18:23:29
55Paillier cryptosystem / Homomorphic encryption / Goldwasser–Micali cryptosystem / Learning with errors / Oblivious transfer / RSA / XTR / ElGamal encryption / Random self-reducibility / Cryptography / Public-key cryptography / Electronic commerce

Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Cr´epeau ? , Raza Ali Kazmi ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 15:33:43
56Ciphertext indistinguishability / RSA / Probabilistic encryption / Oblivious transfer / IP / Index of cryptography articles / Blum–Goldwasser cryptosystem / Cryptography / Electronic commerce / Public-key cryptography

Microsoft PowerPoint - 07-PPT Process Calculus.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-07 00:42:30
57Verifiable secret sharing / Gödel Prize / Interactive proof system / Claude Crépeau / Pseudorandom function family / Probabilistic encryption / Oblivious transfer / Zero-knowledge proof / Provable security / Cryptography / Cryptographic protocols / Silvio Micali

Curriculum Vitae Silvio Micali Ford Professor of Engineering Electrical Engineering and Computer Science Department Stata Center, Room G644, 32 Vassar Street, Cambridge, MA5949

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2015-04-22 20:29:48
58Private information retrieval / Transmission Control Protocol / Quadratic residue / RSA / Cryptography / Cryptographic protocols / Oblivious transfer

Single Database Private Information Retrieval with Logarithmic Communication Yan-Cheng Chang Harvard University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-02-10 23:35:25
59Support / Dirac measure / Applied mathematics / PP / Measure theory / Theoretical computer science / Analysis

Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol∗ Ran Canetti MIT and IBM TJ Watson Research Center ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-02-16 11:54:21
60Oblivious transfer / Decisional Diffie–Hellman assumption / Commitment scheme / Secure multi-party computation / Communications protocol / Zero-knowledge proof / Proof of knowledge / Cryptography / Cryptographic protocols / Universal composability

Efficient Fully-Simulatable Oblivious Transfer∗ Yehuda Lindell† Department of Computer Science Bar-Ilan University, Israel.

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2008-12-21 16:22:00
UPDATE