Abstract—Information-theoretically secure string oblivious transfer (OT) can be constructed based on discrete memoryless channel (DMC). The oblivious transfer capacity of a channel characterizes – similarly to the (standard) information capacity – how efficiently it can be exploited for secure oblivious transfer of strings. The OT capacity of a Generalized Erasure Channel (GEC) – which is a combination of a (general) DMC with the erasure channel – has been established by Ahlswede and Csizar at ISIT’07 in the case of passive adversaries. In this paper, we present the protocol that achieves this capacity against malicious adversaries for GEC with erasure probability at least 1/2. Our construction is based on the protocol of Crépeau and Savv...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
We present a general framework for efficient, universally composable oblivious transfer (OT) protoco...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
Information-theoretically secure string oblivious transfer (OT) can be constructed based on discrete...
Monografia (graduação)—Universidade de Brasília, Faculdade de Tecnologia, 2009.Oblivious Transfer (O...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
Without the use of computational assumptions, unconditionally secure oblivious transfer (OT) is impo...
Interactive Hashing has featured as an essential ingredient in protocols realizing a large variety o...
Oblivious transfer (OT) is a powerful primitive in modern cryptography, often used in a context of s...
In secure two-party computation, two mutually distrusting parties are interested in jointly computin...
In this paper, we study the problem of obtaining 1-of-2 string oblivious transfer (OT) between users...
Abstract—We derive a new upper bound on the string oblivious transfer capacity of discrete memoryles...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
In secure two-party computation, two mutually distrusting parties are interested in jointly computin...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
We present a general framework for efficient, universally composable oblivious transfer (OT) protoco...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
Information-theoretically secure string oblivious transfer (OT) can be constructed based on discrete...
Monografia (graduação)—Universidade de Brasília, Faculdade de Tecnologia, 2009.Oblivious Transfer (O...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
Without the use of computational assumptions, unconditionally secure oblivious transfer (OT) is impo...
Interactive Hashing has featured as an essential ingredient in protocols realizing a large variety o...
Oblivious transfer (OT) is a powerful primitive in modern cryptography, often used in a context of s...
In secure two-party computation, two mutually distrusting parties are interested in jointly computin...
In this paper, we study the problem of obtaining 1-of-2 string oblivious transfer (OT) between users...
Abstract—We derive a new upper bound on the string oblivious transfer capacity of discrete memoryles...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
In secure two-party computation, two mutually distrusting parties are interested in jointly computin...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
We present a general framework for efficient, universally composable oblivious transfer (OT) protoco...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...