Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme allows a buyer to privately choose k out of n digital goods from a merchant without learning information about other n−k goods. In this paper, we propose several efficient two-round k-out-of-n oblivious transfer schemes, in which the receiver R sends O(k) messages to the sender S, and S sends O(n) messages back to R. The schemes provide unconditional security for either sender or receiver. The computational security for the other side is based on the Decisional Diffie-Hellman (DDH) or Chosen-Target Computational Diffie-Hellman (CT-CDH) problems. Our schemes have th...
Security is a major issue for electronic commerce. Crytography is the foundation of security and obl...
In the Journal of Cryptology (20(3):323–373, 2007), Blundo, D’Arco, De Santis and Stinson proposed a...
We proposed a new secure oblivious transfer protocol from indistinguishability obfuscation in this p...
Oblivious transfer is an important cryptographic protocol in various security applications. For exam...
Abstract: A new k-out-of-n oblivious transfer protocol is presented in this paper. The communication...
In this paper, we propose a two-round k-out-of-n oblivious transfer scheme with the minimum communic...
Abstract. We study an adaptive variant of oblivious transfer in which a sender has N messages, of wh...
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper ...
Abstract Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In th...
We present two practical frameworks for $h$-out-of-$n$ oblivious transfer ($OT^{n}_{h}$). The firs...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pin...
Adaptive security embodies one of the strongest notions of security that allows an adversary to corr...
Oblivious Transfer (OT) is a simple, yet fundamental primitive which suffices to achieve almost ever...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...
Abstract Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In th...
Security is a major issue for electronic commerce. Crytography is the foundation of security and obl...
In the Journal of Cryptology (20(3):323–373, 2007), Blundo, D’Arco, De Santis and Stinson proposed a...
We proposed a new secure oblivious transfer protocol from indistinguishability obfuscation in this p...
Oblivious transfer is an important cryptographic protocol in various security applications. For exam...
Abstract: A new k-out-of-n oblivious transfer protocol is presented in this paper. The communication...
In this paper, we propose a two-round k-out-of-n oblivious transfer scheme with the minimum communic...
Abstract. We study an adaptive variant of oblivious transfer in which a sender has N messages, of wh...
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper ...
Abstract Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In th...
We present two practical frameworks for $h$-out-of-$n$ oblivious transfer ($OT^{n}_{h}$). The firs...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pin...
Adaptive security embodies one of the strongest notions of security that allows an adversary to corr...
Oblivious Transfer (OT) is a simple, yet fundamental primitive which suffices to achieve almost ever...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...
Abstract Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In th...
Security is a major issue for electronic commerce. Crytography is the foundation of security and obl...
In the Journal of Cryptology (20(3):323–373, 2007), Blundo, D’Arco, De Santis and Stinson proposed a...
We proposed a new secure oblivious transfer protocol from indistinguishability obfuscation in this p...