More extensions of weak oblivious transfer (original) (raw)

Obtaining Efficient Fully Simulatable Oblivious Transfer from General Assumptions

Anderson Nascimento

Anais do XXI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2011)

View PDFchevron_right

Weakening Security Assumptions and Oblivious Transfer (Abstract)

Claude Crépeau

International Cryptology Conference, 1988

View PDFchevron_right

Efficient oblivious transfers with access control

Willy Susilo

Computers & Mathematics with Applications, 2012

View PDFchevron_right

(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens

Seung Choi

Theory of Cryptography, 2014

View PDFchevron_right

Efficient Unconditional Oblivious Transfer From Almost Any Noisy Channel

Kirill Morozov

Security in Communication Networks, 2005

View PDFchevron_right

An Efficient Secure Oblivious Transfer

周志賢 資訊管理學系-

View PDFchevron_right

S.: Efficient unconditional oblivious transfer from almost any noisy channel

Kirill Morozov

2004

View PDFchevron_right

Essentially Optimal Universally Composable Oblivious Transfer

Ivan Damgård

Information Security and Cryptology – ICISC 2008, 2009

View PDFchevron_right

Secure Two-Party Computation via Leaky Generalized Oblivious Transfer

Alain Tapp

View PDFchevron_right

Weakening Security Assumptions and Oblivious Transfer

Claude Crépeau

Lecture Notes in Computer Science

View PDFchevron_right

Generic Fully Simulatable Adaptive Oblivious Transfer

Lê Phong

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Extending Oblivious Transfers Efficiently

Kobbi Nissim

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Efficient and Universally Composable Committed Oblivious Transfer and Applications

Juan A. Garay

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation

Hideki Imai

Lecture Notes in Computer Science, 2009

View PDFchevron_right

On Unconditionally Secure Distributed Oblivious Transfer

Svetla Nikova

Journal of Cryptology, 2007

View PDFchevron_right

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM

Kirill Morozov

2017

View PDFchevron_right

Reducing Complexity Assumptions for Oblivious Transfer

Takeshi Koshiba

2009

View PDFchevron_right

New Results on Unconditionally Secure Distributed Oblivious Transfer

Carlo Blundo

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Oblivious transfer with a memory-bounded receiver

Claude Crépeau

Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280)

View PDFchevron_right

Generalized Oblivious Transfer

Kirill Morozov

2013

View PDFchevron_right

Oblivious Transfer and Linear Functions

Fer XD

2006

View PDFchevron_right

Oblivious transfer with access control

Jan Camenisch

Proceedings of the ACM Conference on Computer and Communications Security, 2009

View PDFchevron_right

Concurrent oblivious transfer

Juan A. Garay

Proceedings 41st Annual Symposium on Foundations of Computer Science

View PDFchevron_right

Generic Construction of UC-Secure Oblivious Transfer

Olivier Blazy

Lecture Notes in Computer Science, 2015

View PDFchevron_right

Fast and Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security

Megha Byali

2017

View PDFchevron_right

Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer

Juan A. Garay

Advances in Cryptology - CRYPTO 2009, 2009

View PDFchevron_right

Communication-efficient distributed oblivious transfer

Yeow Meng Chee

Journal of Computer and System Sciences, 2012

View PDFchevron_right

Oblivious Transfers and Privacy Amplification

Claude Crépeau

Journal of Cryptology, 2003

View PDFchevron_right

Universally composable adaptive oblivious transfer (with access control) from standard assumptions

Jan Camenisch

Proceedings of the ACM Conference on Computer and Communications Security, 2013

View PDFchevron_right

Committed Oblivious Transfer and Private Multi-Party Computation

Alain Tapp

Lecture Notes in Computer Science, 1995

View PDFchevron_right

Achieving oblivious transfer using weakened security assumptions

Claude Crépeau

View PDFchevron_right

Oblivious Transfer from Weakly Random Self-Reducible Public-Key Cryptosystem

Claude Crépeau

Lecture Notes in Computer Science, 2015

View PDFchevron_right