Abstract. In this paper, we introduce the concept of oblivious transfer with threshold access control. Namely, for each message in a database, the server associates an attribute set τ with it such that the message can only be available, on request, to the users who possess at least t attributes out of τ. Meanwhile, after the server and users execute the protocol, the server will not learn anything about the identities, attributes or message choices of the users. The essential idea of “threshold ” access control is to define the minimum number of attributes from a given set of attributes that users have to possess in order to obtain the message. Combining Sahai and Waters ’ fuzzy identity-based encryption with a credential signature scheme, ...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
This work is about distributed protocols for oblivious transfer, proposed by Naor and Pinkas, and re...
We describe how to construct an oblivious transfer protocol which security is based on subset member...
Abstract—We consider the primitive of restricted oblivious transfer: the owner of a database wants t...
The notion of oblivious transfer with hidden access control policies (HACOT) was recently proposed b...
AbstractOblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from t...
Abstract. Sharing information to others is common nowadays, but the question is with whom to share. ...
The issue of data and information security on the internet and social network has become more seriou...
AbstractIn this work we consider the following primitive, that we call restricted adaptive oblivious...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
International audienceAttribute-based cryptography is a natural solution for fine-grained access con...
LNCS v. 6487 is conference proceedings of Pairing 2010Oblivious Transfer with Access Control (AC-OT)...
[[abstract]]Due to the rapid development of the Internet, an increasing number of applications can b...
This thesis examines a new approach to attribute-based access control with hidden policies and hidde...
Abstract. Motivated by the problem of establishing a session key among parties based on the possessi...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
This work is about distributed protocols for oblivious transfer, proposed by Naor and Pinkas, and re...
We describe how to construct an oblivious transfer protocol which security is based on subset member...
Abstract—We consider the primitive of restricted oblivious transfer: the owner of a database wants t...
The notion of oblivious transfer with hidden access control policies (HACOT) was recently proposed b...
AbstractOblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from t...
Abstract. Sharing information to others is common nowadays, but the question is with whom to share. ...
The issue of data and information security on the internet and social network has become more seriou...
AbstractIn this work we consider the following primitive, that we call restricted adaptive oblivious...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
International audienceAttribute-based cryptography is a natural solution for fine-grained access con...
LNCS v. 6487 is conference proceedings of Pairing 2010Oblivious Transfer with Access Control (AC-OT)...
[[abstract]]Due to the rapid development of the Internet, an increasing number of applications can b...
This thesis examines a new approach to attribute-based access control with hidden policies and hidde...
Abstract. Motivated by the problem of establishing a session key among parties based on the possessi...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
This work is about distributed protocols for oblivious transfer, proposed by Naor and Pinkas, and re...
We describe how to construct an oblivious transfer protocol which security is based on subset member...