[[abstract]]Due to the rapid development of the Internet, an increasing number of applications can be implemented using oblivious transfer (OT) as a sub-protocol, such as privacy-preserving auction, secrets exchange, data mining, and e-commerce. Considering the practicability of an OT mechanism, we think that it is also necessary to discuss how to convince a chooser of the integrity and origin of chosen secrets, except for accuracy,privacy of the sender, and privacy of the chooser. In this paper, we redefine the requirements of a well-designed OT scheme and propose a novel t-out-of-n OT mechanism (OT n T ) based on blind signature. The accuracy of our OT n t mechanism is demonstrated according to the BAN logic. Furthermore, we adopt the pro...
The security of digital goods buyers and sellers is unbalanced. Of course, the property of sellers i...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol introduced by Naor and Pink...
Abstract. Assume A owns two secret k-bit strings. She is willing to disclose one of them to B, at h...
[[abstract]]Providing private communications for involved participants, the oblivious transfer (OT) ...
Security is a major issue for electronic commerce. Crytography is the foundation of security and obl...
AbstractOblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from t...
Oblivious transfer (OT) has been applied widely in privacy-sensitive systems such as on-line transac...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver) put...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
[[abstract]]In 2003, Mu et al. proposed a non-interactive oblivious transfer scheme based on the sta...
We present a novel scheme of noninteractive m out of n oblivious transfer, which demonstrates signif...
Abstract. Priced oblivious transfer (POT) is a two-party protocol be-tween a vendor and a buyer in w...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...
The security of digital goods buyers and sellers is unbalanced. Of course, the property of sellers i...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol introduced by Naor and Pink...
Abstract. Assume A owns two secret k-bit strings. She is willing to disclose one of them to B, at h...
[[abstract]]Providing private communications for involved participants, the oblivious transfer (OT) ...
Security is a major issue for electronic commerce. Crytography is the foundation of security and obl...
AbstractOblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from t...
Oblivious transfer (OT) has been applied widely in privacy-sensitive systems such as on-line transac...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
This work examines the part of an asymmetric cryptography called an oblivious transfer. Our goal is ...
Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver) put...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
[[abstract]]In 2003, Mu et al. proposed a non-interactive oblivious transfer scheme based on the sta...
We present a novel scheme of noninteractive m out of n oblivious transfer, which demonstrates signif...
Abstract. Priced oblivious transfer (POT) is a two-party protocol be-tween a vendor and a buyer in w...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...
The security of digital goods buyers and sellers is unbalanced. Of course, the property of sellers i...
The unconditionally secure Distributed Oblivious Transfer (DOT) protocol introduced by Naor and Pink...
Abstract. Assume A owns two secret k-bit strings. She is willing to disclose one of them to B, at h...