Oblivious transfer

Results: 121



#Item
81ElGamal encryption / RSA / Oblivious transfer / XTR / Ciphertext / Cryptography / Public-key cryptography / Cryptographic protocols

3-6 T  oward Realizing Privacy-Preserving IP-Traceback NOJIMA Ryo The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems hav

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2012-03-11 23:15:00
82Oblivious transfer / Models of computation / Randomness / Random oracle / Oracle machine / Advantage / Optimal asymmetric encryption padding / Secure two-party computation / Random function / Cryptography / Cryptographic protocols / Cryptographic hash functions

Extending Oblivious Transfers Efficiently Yuval Ishai1 , Joe Kilian2 , Kobbi Nissim2? , and Erez Petrank1?? 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:56
83Universal composability / Communications protocol / Secure multi-party computation / IP / Port / Proof of knowledge / Zero-knowledge proof / Commitment scheme / X Window System / Cryptography / Cryptographic protocols / Data

Efficient and Universally Composable Committed Oblivious Transfer and Applications∗ Juan A. Garay† Philip MacKenzie†

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-02-22 16:48:33
84Zero-knowledge proof / Abraham Lempel / Cryptography / Cryptographic protocols / Oblivious transfer

Efficient and Universally Composable Committed Oblivious Transfer and Applications Juan Garay Bell Labs, Lucent Technologies

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-02-17 20:44:10
85Homomorphic encryption / Oblivious transfer / Paillier cryptosystem / Naccache–Stern cryptosystem / Commitment scheme / ElGamal encryption / Transmission Control Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

Verifiable Homomorphic Oblivious Transfer and Private Equality Test Helger Lipmaa Laboratory for Theoretical CS, Department of CS&E Helsinki University of Technology, P.O.Box 5400, FIN[removed]HUT, Espoo, Finland helger@tc

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
86Oblivious transfer / Secure multi-party computation / Decisional Diffie–Hellman assumption / ElGamal encryption / XTR / IP / Degree of a polynomial / Proof of knowledge / Cryptography / Cryptographic protocols / Polynomials

Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs Carmit Hazay∗ Abstract In this paper we study the two fundamental functionalities oblivious polynomial evaluation in the

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-03 11:03:18
87Secure multi-party computation / Internet privacy / Information privacy / Oblivious transfer / Cryptographic protocols / Ethics / Privacy

Privacy-Preserving Methods for Sharing Financial Risk Exposures∗ Emmanuel A. Abbe,1,2 Amir E. Khandani,3 Andrew W. Lo2,3,4∗ 1 EPFL School of Communication and Computer Sciences

Add to Reading List

Source URL: secure.brightworkinc.net

Language: English - Date: 2011-12-14 10:13:24
88Oblivious transfer / ElGamal encryption / Digital signature / Cipher / Alice and Bob / XTR / Cryptography / Public-key cryptography / Cryptographic protocols

A Note on the Bellare-Rivest Protocol for Translucent Cryptography Zhengjun Cao1 , Lihua Liu2,∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-03 22:54:21
89Communication / Communication complexity / Computational complexity theory / Quantum complexity theory / Permutation / Commitment scheme / Applied mathematics / Mathematics / Quantum information science

Extending Oblivious Transfer Efficiently or - How to get active security with constant cryptographic overhead Enrique Larraia Dept. Computer Science, University of Bristol, United Kingdom [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 09:36:57
90Lattice-based cryptography / Homomorphic encryption / Symposium on Theory of Computing / International Cryptology Conference / Symposium on Foundations of Computer Science / Asiacrypt / Oblivious transfer / Eurocrypt / Indocrypt / Cryptography / Formal sciences / Post-quantum cryptography

Vinod Vaikuntanathan Curriculum Vitae Date of Revision:May 2, 2013 A BIOGRAPHICAL INFORMATION A.1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-05-02 00:24:31
UPDATE