In a t-out-n oblivious transfer, the receiver can only receive t messages out of n messages sent by the sender; and the sender has no idea about which ones have been received. Majority of the existing of previous efficient oblivious transfer schemes require t calls of 1-out-n oblivious transfer to construct the t-out-n oblivious transfer. Its computational requirements and bandwidth consumption are quite demanding. Therefore, to guarantee the quality of electronic commercial service, an efficient t-out-n oblivious transfer scheme is urgently desired. Based on the RSA, we propose a new t-out-n oblivious transfer protocol for private information retrieval in this paper. In our method, only several modular multiplications and t hash functions ...
[[abstract]]Due to the rapid development of the Internet, an increasing number of applications can b...
Oblivious Transfer(OT) protocol allows a client retrieving one or multiple records from a server wit...
AbstractDistributed oblivious transfer (DOT) was introduced by Naor and Pinkas (2000) [31], and then...
[[abstract]]The most efficient previous oblivious transfer schemes require 2t rounds of communicatio...
Abstract. The most efficient previously proposed oblivious transfer schemes require t calls of 1-out...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
[[abstract]]In 2003, Mu et al. proposed a non-interactive oblivious transfer scheme based on the sta...
In this paper, we propose a two-round k-out-of-n oblivious transfer scheme with the minimum communic...
We consider the problem of reducing Oblivious Transfer to Private Information Re- trieval. We give a...
Abstract: A new k-out-of-n oblivious transfer protocol is presented in this paper. The communication...
Abstract. We propose a one-round 1-out-of-n computationally-private information retrieval protocol f...
Because the t-out-of-n oblivious transfer (OT) protocol can guarantee the privacy of both participan...
We present a novel scheme of noninteractive m out of n oblivious transfer, which demonstrates signif...
A Single-Database Private Information Retrieval (PIR) is a protocol that allows a user to privately ...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
[[abstract]]Due to the rapid development of the Internet, an increasing number of applications can b...
Oblivious Transfer(OT) protocol allows a client retrieving one or multiple records from a server wit...
AbstractDistributed oblivious transfer (DOT) was introduced by Naor and Pinkas (2000) [31], and then...
[[abstract]]The most efficient previous oblivious transfer schemes require 2t rounds of communicatio...
Abstract. The most efficient previously proposed oblivious transfer schemes require t calls of 1-out...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
[[abstract]]In 2003, Mu et al. proposed a non-interactive oblivious transfer scheme based on the sta...
In this paper, we propose a two-round k-out-of-n oblivious transfer scheme with the minimum communic...
We consider the problem of reducing Oblivious Transfer to Private Information Re- trieval. We give a...
Abstract: A new k-out-of-n oblivious transfer protocol is presented in this paper. The communication...
Abstract. We propose a one-round 1-out-of-n computationally-private information retrieval protocol f...
Because the t-out-of-n oblivious transfer (OT) protocol can guarantee the privacy of both participan...
We present a novel scheme of noninteractive m out of n oblivious transfer, which demonstrates signif...
A Single-Database Private Information Retrieval (PIR) is a protocol that allows a user to privately ...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
[[abstract]]Due to the rapid development of the Internet, an increasing number of applications can b...
Oblivious Transfer(OT) protocol allows a client retrieving one or multiple records from a server wit...
AbstractDistributed oblivious transfer (DOT) was introduced by Naor and Pinkas (2000) [31], and then...