AbstractOblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from the sender without releasing anything about his choices. OT can be used to protect user’s privacy. In principle, any user can interact with a server to request some services. This might allow some undesirable users to obtain services from the server. How to ensure that only the authorized receivers can obtain services obliviously is a daunting task. In this paper, we introduce oblivious signature based-on envelope (OSBE) to OT and propose two novel OT schemes, which only allow the legitimate receivers to obtain services obliviously. The receiver is required to authenticate himself to the issuer to possess the required credential prior to acces...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for u...
International audienceOblivious Transfer (OT) protocols were introduced in the seminal paper of Rabi...
We present a novel scheme of noninteractive m out of n oblivious transfer, which demonstrates signif...
AbstractOblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from t...
Oblivious transfer (OT) has been applied widely in privacy-sensitive systems such as on-line transac...
[[abstract]]Due to the rapid development of the Internet, an increasing number of applications can b...
Security is a major issue for electronic commerce. Crytography is the foundation of security and obl...
peer reviewedOblivious transfer with access control (OTAC) is an extension of oblivious transfer whe...
Oblivious transfer (OT) is a cryptographic primitive originally used to transfer a collection of mes...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
Based on quantum entanglement, an all-or-nothing oblivious transfer (OT) protocol is proposed and is...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
[[abstract]]Providing private communications for involved participants, the oblivious transfer (OT) ...
Abstract. In this paper, we introduce the concept of oblivious transfer with threshold access contro...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for u...
International audienceOblivious Transfer (OT) protocols were introduced in the seminal paper of Rabi...
We present a novel scheme of noninteractive m out of n oblivious transfer, which demonstrates signif...
AbstractOblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from t...
Oblivious transfer (OT) has been applied widely in privacy-sensitive systems such as on-line transac...
[[abstract]]Due to the rapid development of the Internet, an increasing number of applications can b...
Security is a major issue for electronic commerce. Crytography is the foundation of security and obl...
peer reviewedOblivious transfer with access control (OTAC) is an extension of oblivious transfer whe...
Oblivious transfer (OT) is a cryptographic primitive originally used to transfer a collection of mes...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
Based on quantum entanglement, an all-or-nothing oblivious transfer (OT) protocol is proposed and is...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
[[abstract]]Providing private communications for involved participants, the oblivious transfer (OT) ...
Abstract. In this paper, we introduce the concept of oblivious transfer with threshold access contro...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for u...
International audienceOblivious Transfer (OT) protocols were introduced in the seminal paper of Rabi...
We present a novel scheme of noninteractive m out of n oblivious transfer, which demonstrates signif...