[[abstract]]The most efficient previous oblivious transfer schemes require 2t rounds of communication to obtain t secret messages. Its computational requirements and bandwidth consumption are quite demanding. Therefore, to guarantee the quality of this growing popular communication service, an efficient t-out-n oblivious transfer scheme is urgently desired. Based on the discrete logarithm, we propose an efficient t-out-n oblivious transfer scheme in this paper. Compared with existing oblivious transfer schemes, our scheme can reduce many computations and communications for both the sender and the receiver. In our scheme, only several modular multiplications and three rounds of communications are needed for a user (receiver) to obtain t mess...
We consider the problem of reducing Oblivious Transfer to Private Information Re- trieval. We give a...
Abstract Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In th...
We consider the problem of minimizing the communication in single-database private information retri...
In a t-out-n oblivious transfer, the receiver can only receive t messages out of n messages sent by ...
Abstract. The most efficient previously proposed oblivious transfer schemes require t calls of 1-out...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
Abstract. We propose a one-round 1-out-of-n computationally-private information retrieval protocol f...
In this paper, we propose a two-round k-out-of-n oblivious transfer scheme with the minimum communic...
In this paper, we study the problem of single database private information retrieval, and present sc...
Abstract: A new k-out-of-n oblivious transfer protocol is presented in this paper. The communication...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
Oblivious transfer is an important cryptographic protocol in various security applications. For exam...
AbstractDistributed oblivious transfer (DOT) was introduced by Naor and Pinkas (2000) [31], and then...
We present a novel scheme of noninteractive m out of n oblivious transfer, which demonstrates signif...
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications...
We consider the problem of reducing Oblivious Transfer to Private Information Re- trieval. We give a...
Abstract Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In th...
We consider the problem of minimizing the communication in single-database private information retri...
In a t-out-n oblivious transfer, the receiver can only receive t messages out of n messages sent by ...
Abstract. The most efficient previously proposed oblivious transfer schemes require t calls of 1-out...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
Abstract. We propose a one-round 1-out-of-n computationally-private information retrieval protocol f...
In this paper, we propose a two-round k-out-of-n oblivious transfer scheme with the minimum communic...
In this paper, we study the problem of single database private information retrieval, and present sc...
Abstract: A new k-out-of-n oblivious transfer protocol is presented in this paper. The communication...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
Oblivious transfer is an important cryptographic protocol in various security applications. For exam...
AbstractDistributed oblivious transfer (DOT) was introduced by Naor and Pinkas (2000) [31], and then...
We present a novel scheme of noninteractive m out of n oblivious transfer, which demonstrates signif...
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications...
We consider the problem of reducing Oblivious Transfer to Private Information Re- trieval. We give a...
Abstract Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In th...
We consider the problem of minimizing the communication in single-database private information retri...