More extensions of weak oblivious transfer (original) (raw)
Related papers
Obtaining Efficient Fully Simulatable Oblivious Transfer from General Assumptions
Anais do XXI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2011)
Weakening Security Assumptions and Oblivious Transfer (Abstract)
International Cryptology Conference, 1988
Efficient oblivious transfers with access control
Computers & Mathematics with Applications, 2012
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
Theory of Cryptography, 2014
Efficient Unconditional Oblivious Transfer From Almost Any Noisy Channel
Security in Communication Networks, 2005
An Efficient Secure Oblivious Transfer
S.: Efficient unconditional oblivious transfer from almost any noisy channel
2004
Essentially Optimal Universally Composable Oblivious Transfer
Information Security and Cryptology – ICISC 2008, 2009
Secure Two-Party Computation via Leaky Generalized Oblivious Transfer
Weakening Security Assumptions and Oblivious Transfer
Lecture Notes in Computer Science
Generic Fully Simulatable Adaptive Oblivious Transfer
Lecture Notes in Computer Science, 2011
Extending Oblivious Transfers Efficiently
Lecture Notes in Computer Science, 2003
Efficient and Universally Composable Committed Oblivious Transfer and Applications
Lecture Notes in Computer Science, 2004
Lecture Notes in Computer Science, 2009
On Unconditionally Secure Distributed Oblivious Transfer
Journal of Cryptology, 2007
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM
2017
Reducing Complexity Assumptions for Oblivious Transfer
2009
New Results on Unconditionally Secure Distributed Oblivious Transfer
Lecture Notes in Computer Science, 2003
Oblivious transfer with a memory-bounded receiver
Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280)
Generalized Oblivious Transfer
2013
Oblivious Transfer and Linear Functions
2006
Oblivious transfer with access control
Proceedings of the ACM Conference on Computer and Communications Security, 2009
Proceedings 41st Annual Symposium on Foundations of Computer Science
Generic Construction of UC-Secure Oblivious Transfer
Lecture Notes in Computer Science, 2015
Fast and Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security
2017
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer
Advances in Cryptology - CRYPTO 2009, 2009
Communication-efficient distributed oblivious transfer
Journal of Computer and System Sciences, 2012
Oblivious Transfers and Privacy Amplification
Journal of Cryptology, 2003
Universally composable adaptive oblivious transfer (with access control) from standard assumptions
Proceedings of the ACM Conference on Computer and Communications Security, 2013
Committed Oblivious Transfer and Private Multi-Party Computation
Lecture Notes in Computer Science, 1995
Achieving oblivious transfer using weakened security assumptions
Oblivious Transfer from Weakly Random Self-Reducible Public-Key Cryptosystem
Lecture Notes in Computer Science, 2015