Abstract—We present a framework for fully-simulatable h-out-of-n oblivious transfer (OTnh) with security against non-adaptive malicious adversaries. The framework costs six communication rounds and costs at most 40n public-key operations in computational overhead. Com-pared with the known protocols for fully-simulatable oblivious transfer that works in the plain mode (where there is no trusted common reference string available) and proven to be secure under standard model (where there is no random oracle available), the instantiation based on the decisional Diffie-Hellman assumption of the framework is the most efficient one, no matter seen from communication rounds or computational overhead. Our framework uses three abstract tools, i.e., i...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
Constructing oblivious transfer and bit commitment protocols based on chan-nel’s quantum nature to a...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
We present two practical frameworks for $h$-out-of-$n$ oblivious transfer ($OT^{n}_{h}$). The firs...
Oblivious Transfer (OT) is a major primitive for secure multiparty computation. Indeed, combined wit...
International audienceOblivious Transfer (OT) is a major primitive for secure multiparty computation...
Oblivious transfer (OT) is a fundamental primitive in cryptography. Halevi-Kalai OT (Halevi, S. and ...
Oblivious transfer is an important cryptographic protocol in various security applications. For exam...
We describe how to construct an oblivious transfer protocol which security is based on subset member...
International audienceAn important problem in secure multi-party computation is the design of protoc...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
Because of the concise functionality of oblivious transfer (OT) protocols, they have been widely use...
Abstract. We show how to construct a completely generic UC-secure oblivious transfer scheme from a c...
Abstract. We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable s...
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
Constructing oblivious transfer and bit commitment protocols based on chan-nel’s quantum nature to a...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
We present two practical frameworks for $h$-out-of-$n$ oblivious transfer ($OT^{n}_{h}$). The firs...
Oblivious Transfer (OT) is a major primitive for secure multiparty computation. Indeed, combined wit...
International audienceOblivious Transfer (OT) is a major primitive for secure multiparty computation...
Oblivious transfer (OT) is a fundamental primitive in cryptography. Halevi-Kalai OT (Halevi, S. and ...
Oblivious transfer is an important cryptographic protocol in various security applications. For exam...
We describe how to construct an oblivious transfer protocol which security is based on subset member...
International audienceAn important problem in secure multi-party computation is the design of protoc...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
Because of the concise functionality of oblivious transfer (OT) protocols, they have been widely use...
Abstract. We show how to construct a completely generic UC-secure oblivious transfer scheme from a c...
Abstract. We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable s...
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
Constructing oblivious transfer and bit commitment protocols based on chan-nel’s quantum nature to a...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...