Abstract. We provide protocols for the following two-party problem: One party, the sender, has N values and the other party, the receiver, would like to learn k of them, deciding which ones in an adaptive manner (i.e. the ith value may depend on the first i − 1 values). The sender does not want the receiver to obtain more than k values. This is a variant of the well known Oblivious Transfer (OT) problem and has applications in protecting privacy in various settings. We present efficient protocols for the problem that require an O(N) computation in the preprocessing stage and fixed computation (independent of k) for each new value the receiver obtains. The on-line computation involves roughly log N invocations of a 1-out-2 OT protocol. The p...
Abstract. Assume A owns two secret k-bit strings. She is willing to disclose one of them to B, at h...
AbstractIn this work we consider the following primitive, that we call restricted adaptive oblivious...
We use interactive hashing to achieve the most efficient OT protocol to date based solely on the ass...
. We provide protocols for the following two-party problem: One party, the sender, has N values and ...
As recently realized, meta-data of communications are more important than the content itself. As a c...
Abstract. We study an adaptive variant of oblivious transfer in which a sender has N messages, of wh...
Oblivious transfer is an important cryptographic protocol in various security applications. For exam...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...
Assume A owns two secret k--bit strings. She is willing to disclose one of them to B, at his choosin...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
Abstract. An adaptive k-out-of-N Priced Oblivious Transfer (POT) scheme is a two-party protocol betw...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol introduced by Naor and Pink...
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
Abstract. Assume A owns two secret k-bit strings. She is willing to disclose one of them to B, at h...
AbstractIn this work we consider the following primitive, that we call restricted adaptive oblivious...
We use interactive hashing to achieve the most efficient OT protocol to date based solely on the ass...
. We provide protocols for the following two-party problem: One party, the sender, has N values and ...
As recently realized, meta-data of communications are more important than the content itself. As a c...
Abstract. We study an adaptive variant of oblivious transfer in which a sender has N messages, of wh...
Oblivious transfer is an important cryptographic protocol in various security applications. For exam...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...
Assume A owns two secret k--bit strings. She is willing to disclose one of them to B, at his choosin...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
Abstract. An adaptive k-out-of-N Priced Oblivious Transfer (POT) scheme is a two-party protocol betw...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol introduced by Naor and Pink...
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
Abstract. Assume A owns two secret k-bit strings. She is willing to disclose one of them to B, at h...
AbstractIn this work we consider the following primitive, that we call restricted adaptive oblivious...
We use interactive hashing to achieve the most efficient OT protocol to date based solely on the ass...