Assume A owns two secret k--bit strings. She is willing to disclose one of them to B, at his choosing, provided he does not learn anything about the other string. Conversely, B does not want A to learn which secret he chose to learn. A protocol for the above task is said to implement One-out-of-two String Oblivious Transfer, denoted ( 2 1 )--OT k 2 . This primitive is particularly useful in a variety of cryptographic settings. An apparently simpler task corresponds to the case k = 1 of two one-bit secrets: this is known as One-out-of-two Bit Oblivious Transfer, denoted ( 2 1 )--OT 2 . We address the question of reducing ( 2 1 )--OT k 2 to ( 2 1 )--OT 2 . This question is not new: it was introduced in 1986. However, most solutions un...
In the Journal of Cryptology (20(3):323–373, 2007), Blundo, D’Arco, De Santis and Stinson proposed a...
The concept of oblivious transfer (O.T.) that was i n d u c e d by Halpern and Rabin m] turned out t...
Abstract. We provide protocols for the following two-party problem: One party, the sender, has N val...
Abstract. Assume A owns two secret k-bit strings. She is willing to disclose one of them to B, at h...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
i \ (:)-OT, (one-out-of-two Bit Oblivious Transfer) is a technique by which a party S owning two sec...
A \Gamma 2 1 \Delta --OT 2 (one-out-of-two Bit Oblivious Transfer) is a technique by which a part...
In this paper, we study the problem of obtaining 1-of-2 string oblivious transfer (OT) between users...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
Abstract. We show that oblivious transfer of bits from A to B can be obtained from a single instance...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...
. We provide protocols for the following two-party problem: One party, the sender, has N values and ...
Interactive Hashing has featured as an essential ingredient in protocols realizing a large variety o...
We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliec...
In the Journal of Cryptology (20(3):323–373, 2007), Blundo, D’Arco, De Santis and Stinson proposed a...
The concept of oblivious transfer (O.T.) that was i n d u c e d by Halpern and Rabin m] turned out t...
Abstract. We provide protocols for the following two-party problem: One party, the sender, has N val...
Abstract. Assume A owns two secret k-bit strings. She is willing to disclose one of them to B, at h...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
i \ (:)-OT, (one-out-of-two Bit Oblivious Transfer) is a technique by which a party S owning two sec...
A \Gamma 2 1 \Delta --OT 2 (one-out-of-two Bit Oblivious Transfer) is a technique by which a part...
In this paper, we study the problem of obtaining 1-of-2 string oblivious transfer (OT) between users...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
Abstract. We show that oblivious transfer of bits from A to B can be obtained from a single instance...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...
. We provide protocols for the following two-party problem: One party, the sender, has N values and ...
Interactive Hashing has featured as an essential ingredient in protocols realizing a large variety o...
We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliec...
In the Journal of Cryptology (20(3):323–373, 2007), Blundo, D’Arco, De Santis and Stinson proposed a...
The concept of oblivious transfer (O.T.) that was i n d u c e d by Halpern and Rabin m] turned out t...
Abstract. We provide protocols for the following two-party problem: One party, the sender, has N val...