Sciweavers

1087 search results - page 14 / 218
» Distributed Oblivious Transfer
Sort
View
SECRYPT
2007
77views Business» more  SECRYPT 2007»
13 years 9 months ago
Mobile Agent Security with Efficient Oblivious Transfer
Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji
CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 7 months ago
A Framework For Fully-Simulatable h-Out-Of-n Oblivious Transfer
Bing Zeng, Xueming Tang, Chingfang Hsu
SCN
2010
Springer
124views Communications» more  SCN 2010»
13 years 5 months ago
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption
At Asiacrypt 2009, Kurosawa and Nojima showed a fully simulatable adaptive oblivious transfer (OT) protocol under the DDH assumption in the standard model. However, Green and Hohen...
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
ICICS
2005
Springer
14 years 1 months ago
Private Itemset Support Counting
Private itemset support counting (PISC) is a basic building block of various privacy-preserving data mining algorithms. Briefly, in PISC, Client wants to know the support of her i...
Sven Laur, Helger Lipmaa, Taneli Mielikäinen