Abstract. Assume A owns two secret k-bit strings. She is willing to disclose one of them to B, at his choosing, provided he does not learn anything about the other string. Conversely, B does not want A to learn which secret he chose to learn. A protocol for the above task is said to implement One-out-of-two String Oblivious Transfer, denoted (:)-OTk. This primitive is particularly useful in a variety of cryptographic settings. An apparently simpler task corresponds to the case k = 1 of two one-bit secrets: this is known as One-out-of-two Bit Oblivious Transfer, de-noted (:)-OT. We address the question of reducing (:)-OTk to (:)-OT. This question is not new: it was introduced in 1986. However, most so-lutions until now have implicitly or ex...
An oblivious transfer (OT) protocol allows a receiver to obtain one of two bits held by a sender wit...
Oblivious transfer (OT) is a powerful primitive in modern cryptography, often used in a context of s...
An oblivious transfer (OT) protocol allows a receiver to obtain one of two bits held by a sender wit...
Assume A owns two secret k--bit strings. She is willing to disclose one of them to B, at his choosin...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
i \ (:)-OT, (one-out-of-two Bit Oblivious Transfer) is a technique by which a party S owning two sec...
A \Gamma 2 1 \Delta --OT 2 (one-out-of-two Bit Oblivious Transfer) is a technique by which a part...
In this paper, we study the problem of obtaining 1-of-2 string oblivious transfer (OT) between users...
Interactive Hashing has featured as an essential ingredient in protocols realizing a large variety o...
: We construct a two-message oblivious transfer (OT) protocol without setup that guarantees statisti...
[[abstract]]Due to the rapid development of the Internet, an increasing number of applications can b...
Oblivious transfer (OT) is a cryptographic primitive originally used to transfer a collection of mes...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
Secret key agreement protocol between legal parties based on reconciliation and privacy amplificatio...
An oblivious transfer (OT) protocol allows a receiver to obtain one of two bits held by a sender wit...
Oblivious transfer (OT) is a powerful primitive in modern cryptography, often used in a context of s...
An oblivious transfer (OT) protocol allows a receiver to obtain one of two bits held by a sender wit...
Assume A owns two secret k--bit strings. She is willing to disclose one of them to B, at his choosin...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
i \ (:)-OT, (one-out-of-two Bit Oblivious Transfer) is a technique by which a party S owning two sec...
A \Gamma 2 1 \Delta --OT 2 (one-out-of-two Bit Oblivious Transfer) is a technique by which a part...
In this paper, we study the problem of obtaining 1-of-2 string oblivious transfer (OT) between users...
Interactive Hashing has featured as an essential ingredient in protocols realizing a large variety o...
: We construct a two-message oblivious transfer (OT) protocol without setup that guarantees statisti...
[[abstract]]Due to the rapid development of the Internet, an increasing number of applications can b...
Oblivious transfer (OT) is a cryptographic primitive originally used to transfer a collection of mes...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
Secret key agreement protocol between legal parties based on reconciliation and privacy amplificatio...
An oblivious transfer (OT) protocol allows a receiver to obtain one of two bits held by a sender wit...
Oblivious transfer (OT) is a powerful primitive in modern cryptography, often used in a context of s...
An oblivious transfer (OT) protocol allows a receiver to obtain one of two bits held by a sender wit...