As recently realized, meta-data of communications are more important than the content itself. As a consequence, for privacy reasons, when one queries a database, nobody should learn the query, whereas the user would like to get the answer. Oblivious transfer (OT) protocols have been proposed by Rabin [Rab81] in 1981: the sender sends a message to the receiver with probability one half, while the sender remains oblivious as to whether or not the receiver received the message. It has thereafter been converted by Even et al. [EGL85] into the so-called 1-out-of-2 oblivious transfer, where the sender sends two messages, and the receiver chooses to receive one of them: the receiver learns nothing about the other one and the sender remains oblivio...
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
. We provide protocols for the following two-party problem: One party, the sender, has N values and ...
Abstract. We provide protocols for the following two-party problem: One party, the sender, has N val...
A Single-Database Private Information Retrieval (PIR) is a protocol that allows a user to privately ...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol introduced by Naor and Pink...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
AbstractIn this work we consider the following primitive, that we call restricted adaptive oblivious...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
Abstract. We study an adaptive variant of oblivious transfer in which a sender has N messages, of wh...
Assume A owns two secret k--bit strings. She is willing to disclose one of them to B, at his choosin...
Oblivious transfer (OT) is a cryptographic primitive originally used to transfer a collection of mes...
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
. We provide protocols for the following two-party problem: One party, the sender, has N values and ...
Abstract. We provide protocols for the following two-party problem: One party, the sender, has N val...
A Single-Database Private Information Retrieval (PIR) is a protocol that allows a user to privately ...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol introduced by Naor and Pink...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
AbstractIn this work we consider the following primitive, that we call restricted adaptive oblivious...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
Abstract. We study an adaptive variant of oblivious transfer in which a sender has N messages, of wh...
Assume A owns two secret k--bit strings. She is willing to disclose one of them to B, at his choosin...
Oblivious transfer (OT) is a cryptographic primitive originally used to transfer a collection of mes...
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...