Oblivious transfer (OT) has been applied widely in privacy-sensitive systems such as on-line transactions and electronic commerce to protect users\u27 private information. Traceability is an interesting feature of such systems that the privacy of the dishonest users could be traced by the service provider or a trusted third party (TTP). However, previous research on OT mainly focused on designing protocols with unconditional receiver\u27s privacy. Thus, traditional OT schemes cannot fulfill the traceability requirements in the aforementioned applications. In this paper, we address this problem by presenting a novel traceable oblivious transfer (TOT) without involvement of any TTP. In the new system, an honest receiver is able to make a fixe...
[[abstract]]In 2003, Mu et al. proposed a non-interactive oblivious transfer scheme based on the sta...
As recently realized, meta-data of communications are more important than the content itself. As a c...
Without the use of computational assumptions, unconditionally secure oblivious transfer (OT) is impo...
Oblivious transfer (OT) has been applied widely in privacy-sensitive systems such as on-line transac...
AbstractOblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from t...
[[abstract]]Due to the rapid development of the Internet, an increasing number of applications can b...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
We present a novel scheme of noninteractive m out of n oblivious transfer, which demonstrates signif...
Security is a major issue for electronic commerce. Crytography is the foundation of security and obl...
Oblivious transfer (OT) is a cryptographic primitive originally used to transfer a collection of mes...
[[abstract]]Providing private communications for involved participants, the oblivious transfer (OT) ...
Abstract. Priced oblivious transfer (POT) is a two-party protocol be-tween a vendor and a buyer in w...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for u...
In a t-out-n oblivious transfer, the receiver can only receive t messages out of n messages sent by ...
[[abstract]]In 2003, Mu et al. proposed a non-interactive oblivious transfer scheme based on the sta...
As recently realized, meta-data of communications are more important than the content itself. As a c...
Without the use of computational assumptions, unconditionally secure oblivious transfer (OT) is impo...
Oblivious transfer (OT) has been applied widely in privacy-sensitive systems such as on-line transac...
AbstractOblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from t...
[[abstract]]Due to the rapid development of the Internet, an increasing number of applications can b...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
We present a novel scheme of noninteractive m out of n oblivious transfer, which demonstrates signif...
Security is a major issue for electronic commerce. Crytography is the foundation of security and obl...
Oblivious transfer (OT) is a cryptographic primitive originally used to transfer a collection of mes...
[[abstract]]Providing private communications for involved participants, the oblivious transfer (OT) ...
Abstract. Priced oblivious transfer (POT) is a two-party protocol be-tween a vendor and a buyer in w...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for u...
In a t-out-n oblivious transfer, the receiver can only receive t messages out of n messages sent by ...
[[abstract]]In 2003, Mu et al. proposed a non-interactive oblivious transfer scheme based on the sta...
As recently realized, meta-data of communications are more important than the content itself. As a c...
Without the use of computational assumptions, unconditionally secure oblivious transfer (OT) is impo...