WEAKENING SECURITY ASSUMPTIONS AND OBLIVIOUS TRANSFER

被引:0
|
作者
CREPEAU, C
KILIAN, J
机构
[1] MIT, DEPT MATH, CAMBRIDGE, MA 02139 USA
[2] BELL COMMUN RES INC, RED BANK, NJ USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:2 / 7
页数:6
相关论文
共 50 条
  • [1] On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
    Damgård, I
    Kilian, J
    Salvail, L
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 56 - 73
  • [2] Oblivious transfer based on the McEliece assumptions
    Dowsley, Rafael
    van de Graaf, Jeroen
    Mueller-Quade, Joern
    Nascimento, Anderson C. A.
    [J]. INFORMATION THEORETIC SECURITY, PROCEEDINGS, 2008, 5155 : 107 - +
  • [3] Reducing Complexity Assumptions for Oblivious Transfer
    Cheong, K. Y.
    Koshiba, Takeshi
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 110 - 124
  • [4] Oblivious Transfer Based on the McEliece Assumptions
    Dowsley, Rafael
    van de Graaf, Jeroen
    Mueller-Quade, Joern
    Nascimento, Anderson C. A.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (02) : 567 - 575
  • [5] Towards Wireless Security without Computational Assumptions -An Oblivious Transfer Protocol Based on an Unauthenticated Wireless Channel
    Hao, Zhuo
    Zhong, Sheng
    Li, Li Erran
    [J]. 2011 PROCEEDINGS IEEE INFOCOM, 2011, : 2156 - 2164
  • [6] Practical Adaptive Oblivious Transfer from Simple Assumptions
    Green, Matthew
    Hohenberger, Susan
    [J]. THEORY OF CRYPTOGRAPHY, 2011, 6597 : 347 - 363
  • [7] Toward Wireless Security without Computational Assumptions-Oblivious Transfer Based on Wireless Channel Characteristics
    Hao, Zhuo
    Mao, Yunlong
    Zhong, Sheng
    Li, Li Erran
    Yao, Haifan
    Yu, Nenghai
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (06) : 1579 - 1592
  • [8] Strengthening the Security of Distributed Oblivious Transfer
    Cheong, K. Y.
    Koshiba, Takeshi
    Nishiyama, Shohei
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 377 - 388
  • [9] Efficient Fully Simulatable Oblivious Transfer from the McEliece Assumptions
    Machado David, Bernardo
    Nascimento, Anderson C. A.
    De Sousa, Rafael T., Jr.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (11) : 2059 - 2066
  • [10] Adaptive oblivious transfer with access control from lattice assumptions
    Libert, Benoit
    Ling, San
    Mouhartem, Fabrice
    Nguyen, Khoa
    Wang, Huaxiong
    [J]. THEORETICAL COMPUTER SCIENCE, 2021, 891 : 210 - 229