6 pages.-- Contributed to: X Spanish Meeting on Cryptology and Information Security (Salamanca, Spain, Sep 2-5, 2008).We consider the primitive of restricted oblivious transfer: the owner of a database wants to restrict the access of users to this data according to some policy, whereas a legitimate user wants to privately retrieve allowed parts of the data, without letting the owner know which part of the data is being obtained.We formally describe the protocols and required properties for restricted oblivious transfer, and we explain how the techniques of priced oblivious transfer can be used to solve the problem in the particular case where the family of restrictions is a weighted threshold one. We state a conjecture on a new characteriz...
Numerous high-profile works have shown that access patterns to even encrypted databases can leak sec...
A Single-Database Private Information Retrieval (PIR) is a protocol that allows a user to privately ...
Cryptography with restricted conditions refers to cryptographic primitives with special requirements...
Abstract—We consider the primitive of restricted oblivious transfer: the owner of a database wants t...
AbstractIn this work we consider the following primitive, that we call restricted adaptive oblivious...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
The notion of Generalized Oblivious Transfer (GOT) was introduced by Ishai and Kushilevitz in [12]. ...
The notion of oblivious transfer with hidden access control policies (HACOT) was recently proposed b...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinka...
Abstract. In this paper, we introduce the concept of oblivious transfer with threshold access contro...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pin...
This paper is about the Oblivious Transfer in the distributed model recently proposed by M. Naor and...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedi...
Numerous high-profile works have shown that access patterns to even encrypted databases can leak sec...
A Single-Database Private Information Retrieval (PIR) is a protocol that allows a user to privately ...
Cryptography with restricted conditions refers to cryptographic primitives with special requirements...
Abstract—We consider the primitive of restricted oblivious transfer: the owner of a database wants t...
AbstractIn this work we consider the following primitive, that we call restricted adaptive oblivious...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
The notion of Generalized Oblivious Transfer (GOT) was introduced by Ishai and Kushilevitz in [12]. ...
The notion of oblivious transfer with hidden access control policies (HACOT) was recently proposed b...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinka...
Abstract. In this paper, we introduce the concept of oblivious transfer with threshold access contro...
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pin...
This paper is about the Oblivious Transfer in the distributed model recently proposed by M. Naor and...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedi...
Numerous high-profile works have shown that access patterns to even encrypted databases can leak sec...
A Single-Database Private Information Retrieval (PIR) is a protocol that allows a user to privately ...
Cryptography with restricted conditions refers to cryptographic primitives with special requirements...