Analysis of an Unconditionally Secure Distributed Oblivious Transfer

被引:0
|
作者
Hossein Ghodosi
机构
[1] James Cook University,Department of Information Technology, School of Business
来源
Journal of Cryptology | 2013年 / 26卷
关键词
Oblivious transfer; Secret sharing; Distributed cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
In the Journal of Cryptology (20(3):323–373, 2007), Blundo, D’Arco, De Santis and Stinson proposed a general model for unconditionally secure distributed oblivious transfer (DOT), where a sender has n secrets and a receiver is interested to one of them.
引用
收藏
页码:75 / 79
页数:4
相关论文
共 50 条
  • [31] Strengthening the Security of Distributed Oblivious Transfer
    Cheong, K. Y.
    Koshiba, Takeshi
    Nishiyama, Shohei
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 377 - 388
  • [32] A Verifiable Distributed Oblivious Transfer Protocol
    Corniaux, Christian L. F.
    Ghodosi, Hossein
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 444 - 450
  • [33] Secure oblivious transfer protocol from indistinguishability obfuscation
    Yuan Zheng
    Wang Mei
    Feng Xiao
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2016, 23 (03) : 1 - 10
  • [34] Comment on "quantum oblivious transfer: a secure practical implementation"
    He, Guang Ping
    QUANTUM INFORMATION PROCESSING, 2017, 16 (04)
  • [35] Secure oblivious transfer protocol from indistinguishability obfuscation
    Yuan Zheng
    Wang Mei
    Feng Xiao
    The Journal of China Universities of Posts and Telecommunications, 2016, (03) : 1 - 10
  • [36] Comment on “quantum oblivious transfer: a secure practical implementation”
    Guang Ping He
    Quantum Information Processing, 2017, 16
  • [37] Communication-efficient distributed oblivious transfer
    Beimel, Amos
    Chee, Yeow Meng
    Wang, Huaxiong
    Zhang, Liang Feng
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (04) : 1142 - 1157
  • [38] Distributed Oblivious RAM for Secure Two-Party Computation
    Lu, Steve
    Ostrovsky, Rafail
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 377 - 396
  • [39] Distributed Protocols for Oblivious Transfer and Polynomial Evaluation
    Ben Arie, Aviad
    Tassa, Tamir
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2023, PT II, 2024, 14460 : 62 - 83
  • [40] Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment
    Kim, Soongohn
    Kim, Seoksoo
    Lee, Geuk
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2009, 25 (03): : 352 - 357