Analysis of an Unconditionally Secure Distributed Oblivious Transfer

被引:0
|
作者
Hossein Ghodosi
机构
[1] James Cook University,Department of Information Technology, School of Business
来源
Journal of Cryptology | 2013年 / 26卷
关键词
Oblivious transfer; Secret sharing; Distributed cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
In the Journal of Cryptology (20(3):323–373, 2007), Blundo, D’Arco, De Santis and Stinson proposed a general model for unconditionally secure distributed oblivious transfer (DOT), where a sender has n secrets and a receiver is interested to one of them.
引用
收藏
页码:75 / 79
页数:4
相关论文
共 50 条
  • [41] SHADE: Secure HAmming DistancE Computation from Oblivious Transfer
    Bringer, Julien
    Chabanne, Herve
    Patey, Alain
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2013 WORKSHOPS, 2013, 7862 : 164 - 176
  • [42] Secure quantum weak oblivious transfer against individual measurements
    He, Guang Ping
    QUANTUM INFORMATION PROCESSING, 2015, 14 (06) : 2153 - 2170
  • [43] MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer
    Keller, Marcel
    Orsini, Emmanuela
    Scholl, Peter
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 830 - 842
  • [44] Secure quantum weak oblivious transfer against individual measurements
    Guang Ping He
    Quantum Information Processing, 2015, 14 : 2153 - 2170
  • [45] SODA: A Set of Fast Oblivious Algorithms in Distributed Secure Data Analytics
    Li, Xiang
    Sun, Nuozhou
    Luo, Yunqian
    Gao, Mingyu
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (07): : 1671 - 1684
  • [46] Optimal secure data retrieval using an oblivious transfer scheme
    Malek, B
    Miri, A
    WIMOB'2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 2, PROCEEDINGS: MOBILE NETWORKING, 2005, : 25 - 31
  • [47] Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting
    Costa, Bruno
    Branco, Pedro
    Goulao, Manuel
    Lemus, Mariano
    Mateus, Paulo
    ENTROPY, 2021, 23 (08)
  • [48] Verifiable Distributed Oblivious Transfer and Mobile Agent Security
    Sheng Zhong
    Yang Richard Yang
    Mobile Networks and Applications, 2006, 11 : 201 - 210
  • [49] Scalar Product-Based Distributed Oblivious, Transfer
    Corniaux, Christian L. F.
    Ghodosi, Hossein
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 338 - 354
  • [50] On insecurity of Naor-Pinkas' distributed oblivious transfer
    Ghodosi, Hossein
    INFORMATION PROCESSING LETTERS, 2007, 104 (05) : 179 - 182