Oblivious transfer

Results: 121



#Item
71Models of computation / Oblivious transfer / Random oracle / Oracle machine / FO / Query / IP / Advantage / Cryptography / Theoretical computer science / Computability theory

Feasibility and Infeasibility of Secure Computation with Malicious PUFs Dana Dachman-Soled1 , Nils Fleischhacker2 , Jonathan Katz1 , Anna Lysyanskaya3 , and Dominique Schr¨oder2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-29 09:12:17
72Computing / Tokens / Data transmission / Security token / Oblivious transfer / Actor model / Token / Universal composability / Access token / Cryptographic protocols / Data / Information

c IACRThis article is the final version submitted by the author(s) to the IACR and to Springer-Verlag on 2013 December 3. The version published by Springer-Verlag is available at . (Efficient) Universally C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-11 22:12:12
73Heat transfer / Medical emergencies / Cryobiology / Physiology / Diving medicine / Hypothermia / Thermoregulation / Shivering / Cold / Meteorology / Atmospheric sciences / Medicine

by Thomas Gross, M.D. My Friends were huddling out of the freezing rain in a temporary shelter, brewing some tea. Oblivious to the icy downpour, I sat on a snow-covered log and pulled off my boots. I set them in a snowba

Add to Reading List

Source URL: www.aasfonline.org

Language: English - Date: 2011-06-09 15:09:46
74XTR / Oblivious transfer / Factorial / BLAKE / Bit array / Cryptography / Cryptographic protocols / Private information retrieval

The Computational Complexity Column by Lance Fortnow Department of Computer Science, University of Chicago 1100 East 58th St., Chicago, ILUSA

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-09-24 16:43:18
75Oblivious transfer / Cryptography / Paillier cryptosystem / Public-key cryptography

CS355: Topics in cryptography Spring 2010 Assignment #1 Due: Thursday, May. 6, 2010.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-08-22 15:53:32
76Communications protocol / Secure two-party computation / Oblivious transfer / Secure multi-party computation / Transmission Control Protocol / Two-phase commit protocol / Public-key cryptography / Circuit / Cryptography / Cryptographic protocols / Commitment scheme

Non-Interactive Secure Computation Based on Cut-and-Choose Arash Afshar1 , Payman Mohassel1 , Benny Pinkas2? , and Ben Riva2,3?? 1 University of Calgary

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-25 05:51:56
77Oblivious transfer / Ciphertext indistinguishability / Verifiable computing / Cryptography / Homomorphic encryption / RSA

Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption∗ Jonathan Katz† Aishwarya Thiruvengadam‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 12:50:07
78Communications protocol / XTR / Transmission Control Protocol / Diffie–Hellman key exchange / Digital signature / Random oracle / Oracle machine / IP / E0 / Cryptography / Cryptographic protocols / Oblivious transfer

The Simplest Protocol for Oblivious Transfer Tung Chou1 and Claudio Orlandi2 1 Technische Universieit Eindhoven 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 06:07:01
79Group signature / Oblivious transfer / Public-key cryptography / Communications protocol / Signature / Cryptographic protocol / ElGamal signature scheme / Cryptography / Blind signature / Digital signature

Fair Blind Signatures Markus Stadler1 , Jean-Marc Piveteau2 , Jan Camenisch1 1 Institute for Theoretical Computer Science ETH Zurich

Add to Reading List

Source URL: www.ubilab.org

Language: English - Date: 2013-09-04 09:24:20
80Decisional Diffie–Hellman assumption / Paillier cryptosystem / XTR / RSA / ElGamal encryption / Cryptography / Public-key cryptography / Oblivious transfer

4-3 A Survey on Oblivious Transfer Protocols Le Trieu Phong In this paper, we survey some constructions of oblivious transfer (OT) protocols from public key encryption schemes. We begin with a simple construction of 1-o

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:07:55
UPDATE