AbstractIn this work we consider the following primitive, that we call restricted adaptive oblivious transfer. On the one hand, the owner of a database wants to restrict the access of users to this data according to some policy, in such a way that a user can only obtain information satisfying the restrictions imposed by the owner. On the other hand, a legitimate user wants to privately retrieve allowed parts of the data, in a sequential and adaptive way, without letting the owner know which part of the data is being obtained.After having formally described the components and required properties of a protocol for restricted adaptive oblivious transfer, we propose two generic ways to realize this primitive. The first one uses a cryptographic ...
Abstract. We provide protocols for the following two-party problem: One party, the sender, has N val...
A procurement protocol is a protocol for a buyer to purchase digital goods at their prices from a ve...
This work is about distributed protocols for oblivious transfer, proposed by Naor and Pinkas, and re...
AbstractIn this work we consider the following primitive, that we call restricted adaptive oblivious...
Abstract—We consider the primitive of restricted oblivious transfer: the owner of a database wants t...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
The notion of Generalized Oblivious Transfer (GOT) was introduced by Ishai and Kushilevitz in [12]. ...
Abstract. We study an adaptive variant of oblivious transfer in which a sender has N messages, of wh...
Abstract. We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable s...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...
Abstract. Sharing information to others is common nowadays, but the question is with whom to share. ...
. We provide protocols for the following two-party problem: One party, the sender, has N values and ...
Abstract. We propose a one-round 1-out-of-n computationally-private information retrieval protocol f...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol introduced by Naor and Pink...
Abstract. We provide protocols for the following two-party problem: One party, the sender, has N val...
A procurement protocol is a protocol for a buyer to purchase digital goods at their prices from a ve...
This work is about distributed protocols for oblivious transfer, proposed by Naor and Pinkas, and re...
AbstractIn this work we consider the following primitive, that we call restricted adaptive oblivious...
Abstract—We consider the primitive of restricted oblivious transfer: the owner of a database wants t...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
The notion of Generalized Oblivious Transfer (GOT) was introduced by Ishai and Kushilevitz in [12]. ...
Abstract. We study an adaptive variant of oblivious transfer in which a sender has N messages, of wh...
Abstract. We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable s...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...
Abstract. Sharing information to others is common nowadays, but the question is with whom to share. ...
. We provide protocols for the following two-party problem: One party, the sender, has N values and ...
Abstract. We propose a one-round 1-out-of-n computationally-private information retrieval protocol f...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol introduced by Naor and Pink...
Abstract. We provide protocols for the following two-party problem: One party, the sender, has N val...
A procurement protocol is a protocol for a buyer to purchase digital goods at their prices from a ve...
This work is about distributed protocols for oblivious transfer, proposed by Naor and Pinkas, and re...