In the various distributed oblivious transfer (DOT) protocols designed in an unconditionally secure environment, a receiver contacts k out of m servers to obtain one of the n secrets held by a sender. After a protocol has been executed, the sender has no information on the choice of the receiver and the receiver has no information on the secrets she did not obtain. These protocols are based on a semi-honest model: no mechanism prevents a group of malicious servers from disrupting the protocol such that the secret obtained by the receiver does not correspond to the chosen secret. This paper presents ongoing work towards the definition of the first unconditionally secure verifiable DOT protocol in the presence of an active adversary who...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinka...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pin...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...
In the various distributed oblivious transfer (DOT) protocols designed in an unconditionally secure ...
In the various distributed oblivious transfer (DOT) protocols designed in an unconditionally secure ...
In the various 1-out-of-$n$ distributed oblivious transfer protocols (DOT) designed in an unconditio...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol presented by Blundo, D'Arco...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol introduced by Naor and Pink...
In a distributed oblivious transfer (DOT) the sender is replaced with m servers, and the receiver mu...
The security of digital goods buyers and sellers is unbalanced. Of course, the property of sellers i...
In the Journal of Cryptology (20(3):323–373, 2007), Blundo, D’Arco, De Santis and Stinson proposed a...
AbstractDistributed oblivious transfer (DOT) was introduced by Naor and Pinkas (2000) [31], and then...
In an unconditionally secure Distributed Oblivious Transfer (DOT) protocol, a receiver contacts at l...
This paper is about the Oblivious Transfer in the distributed model recently proposed by M. Naor and...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinka...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinka...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pin...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...
In the various distributed oblivious transfer (DOT) protocols designed in an unconditionally secure ...
In the various distributed oblivious transfer (DOT) protocols designed in an unconditionally secure ...
In the various 1-out-of-$n$ distributed oblivious transfer protocols (DOT) designed in an unconditio...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol presented by Blundo, D'Arco...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol introduced by Naor and Pink...
In a distributed oblivious transfer (DOT) the sender is replaced with m servers, and the receiver mu...
The security of digital goods buyers and sellers is unbalanced. Of course, the property of sellers i...
In the Journal of Cryptology (20(3):323–373, 2007), Blundo, D’Arco, De Santis and Stinson proposed a...
AbstractDistributed oblivious transfer (DOT) was introduced by Naor and Pinkas (2000) [31], and then...
In an unconditionally secure Distributed Oblivious Transfer (DOT) protocol, a receiver contacts at l...
This paper is about the Oblivious Transfer in the distributed model recently proposed by M. Naor and...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinka...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinka...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pin...
Abstract. This work describes distributed protocols for oblivious transfer, in which the role of the...