Sciweavers

1087 search results - page 11 / 218
» Distributed Oblivious Transfer
Sort
View
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
14 years 1 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...
EUROCRYPT
2001
Springer
14 years 6 days ago
Priced Oblivious Transfer: How to Sell Digital Goods
Abstract. We consider the question of protecting the privacy of customers buying digital goods. More specifically, our goal is to allow a buyer to purchase digital goods from a ve...
William Aiello, Yuval Ishai, Omer Reingold
DAGSTUHL
2006
13 years 9 months ago
Using Quantum Oblivious Transfer to Cheat Sensitive Quantum Bit Commitment
It is well known that unconditionally secure bit commitment is impossible even in the quantum world. In this paper a weak variant of quantum bit commitment, introduced independent...
Andreas Jakoby, Maciej Liskiewicz, Aleksander Madr...
TRUST
2010
Springer
14 years 23 days ago
Oblivious Transfer Based on Physical Unclonable Functions
us Transfer based on Physical Unclonable Functions (Extended Abstract)" Session 2 (Tuesday 15:00 - 16:30) Place: „Salon Tiergarten“ 15:00-15:30 Patrick Koeberl (Intel; Ire...
Ulrich Rührmair
CCS
2009
ACM
14 years 2 months ago
Oblivious transfer with access control
Jan Camenisch, Maria Dubovitskaya, Gregory Neven