This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinkas. In this setting a Sender has n secrets and a Receiver is interested in one of them. During a set up phase, the Sender gives information about the secrets to m Servers. Afterwards, in a recovering phase, the Receiver can compute the secret she wishes by interacting with any k of them. More precisely, from the answers received she computes the secret in which she is interested but she gets no information on the others and, at the same time, any coalition of k − 1 Servers can neither compute any secret nor figure out which one the Receiver has recovered. We present an analysis and new results holding for this model: lower bounds on the resour...
In the various distributed oblivious transfer (DOT) protocols designed in an unconditionally secure ...
In an unconditionally secure Distributed Oblivious Transfer (DOT) protocol, a receiver contacts at l...
In the various distributed oblivious transfer (DOT) protocols designed in an unconditionally secure ...
This paper is about the Oblivious Transfer in the distributed model recently proposed by M. Naor and...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinka...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pin...
This work is about distributed protocols for oblivious transfer, proposed by Naor and Pinkas, and re...
The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedi...
In a distributed oblivious transfer (DOT) the sender is replaced with m servers, and the receiver mu...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...
In the Journal of Cryptology (20(3):323–373, 2007), Blundo, D’Arco, De Santis and Stinson proposed a...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol introduced by Naor and Pink...
In the various 1-out-of-$n$ distributed oblivious transfer protocols (DOT) designed in an unconditio...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol presented by Blundo, D'Arco...
AbstractDistributed oblivious transfer (DOT) was introduced by Naor and Pinkas (2000) [31], and then...
In the various distributed oblivious transfer (DOT) protocols designed in an unconditionally secure ...
In an unconditionally secure Distributed Oblivious Transfer (DOT) protocol, a receiver contacts at l...
In the various distributed oblivious transfer (DOT) protocols designed in an unconditionally secure ...
This paper is about the Oblivious Transfer in the distributed model recently proposed by M. Naor and...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinka...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pin...
This work is about distributed protocols for oblivious transfer, proposed by Naor and Pinkas, and re...
The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedi...
In a distributed oblivious transfer (DOT) the sender is replaced with m servers, and the receiver mu...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...
In the Journal of Cryptology (20(3):323–373, 2007), Blundo, D’Arco, De Santis and Stinson proposed a...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol introduced by Naor and Pink...
In the various 1-out-of-$n$ distributed oblivious transfer protocols (DOT) designed in an unconditio...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol presented by Blundo, D'Arco...
AbstractDistributed oblivious transfer (DOT) was introduced by Naor and Pinkas (2000) [31], and then...
In the various distributed oblivious transfer (DOT) protocols designed in an unconditionally secure ...
In an unconditionally secure Distributed Oblivious Transfer (DOT) protocol, a receiver contacts at l...
In the various distributed oblivious transfer (DOT) protocols designed in an unconditionally secure ...