[[abstract]]The most efficient previously proposed oblivious transfer schemes require t calls of 1-out-n oblivious transfer (OT) to construct the t-out-n OT. Its computational requirements and bandwidth consumption are quite demanding. Therefore, to guarantee the quality of growing popular communication service, an efficient t-out-n OT scheme with low bandwidth is urgently desired. Based on elliptic curve cryptosystems, we propose a new t-out-n OT scheme in this paper. Compared with existing OT schemes based on modular exponentiations, our scheme can reduce many computation and communication loads for both the sender and the receiver. Owing to its smaller bandwidth and faster computation speed, our scheme is very suitable for mobile clients...
We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliec...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...
*: corresponding author Low bandwidth consumption is an important issue in a busy commercial network...
Abstract. The most efficient previously proposed oblivious transfer schemes require t calls of 1-out...
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper ...
[[abstract]]The most efficient previous oblivious transfer schemes require 2t rounds of communicatio...
Abstract Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In th...
Abstract: A new k-out-of-n oblivious transfer protocol is presented in this paper. The communication...
Abstract Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In th...
In a t-out-n oblivious transfer, the receiver can only receive t messages out of n messages sent by ...
Oblivious transfer is an important cryptographic protocol in various security applications. For exam...
Because the t-out-of-n oblivious transfer (OT) protocol can guarantee the privacy of both participan...
Security is a major issue for electronic commerce. Crytography is the foundation of security and obl...
In this paper, we propose a two-round k-out-of-n oblivious transfer scheme with the minimum communic...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliec...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...
*: corresponding author Low bandwidth consumption is an important issue in a busy commercial network...
Abstract. The most efficient previously proposed oblivious transfer schemes require t calls of 1-out...
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper ...
[[abstract]]The most efficient previous oblivious transfer schemes require 2t rounds of communicatio...
Abstract Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In th...
Abstract: A new k-out-of-n oblivious transfer protocol is presented in this paper. The communication...
Abstract Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In th...
In a t-out-n oblivious transfer, the receiver can only receive t messages out of n messages sent by ...
Oblivious transfer is an important cryptographic protocol in various security applications. For exam...
Because the t-out-of-n oblivious transfer (OT) protocol can guarantee the privacy of both participan...
Security is a major issue for electronic commerce. Crytography is the foundation of security and obl...
In this paper, we propose a two-round k-out-of-n oblivious transfer scheme with the minimum communic...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliec...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...
*: corresponding author Low bandwidth consumption is an important issue in a busy commercial network...