Sciweavers

150 search results - page 14 / 30
» Oblivious Transfer Is Symmetric
Sort
View
SCN
2010
Springer
124views Communications» more  SCN 2010»
13 years 5 months ago
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption
At Asiacrypt 2009, Kurosawa and Nojima showed a fully simulatable adaptive oblivious transfer (OT) protocol under the DDH assumption in the standard model. However, Green and Hohen...
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
ICICS
2005
Springer
14 years 1 months ago
Private Itemset Support Counting
Private itemset support counting (PISC) is a basic building block of various privacy-preserving data mining algorithms. Briefly, in PISC, Client wants to know the support of her i...
Sven Laur, Helger Lipmaa, Taneli Mielikäinen
SODA
2010
ACM
174views Algorithms» more  SODA 2010»
13 years 5 months ago
Cache-Oblivious Dynamic Dictionaries with Update/Query Tradeoffs
Several existing cache-oblivious dynamic dictionaries achieve O(logB N) (or slightly better O(logB N M )) memory transfers per operation, where N is the number of items stored, M ...
Gerth Stølting Brodal, Erik D. Demaine, Jer...
CRYPTO
1990
Springer
79views Cryptology» more  CRYPTO 1990»
13 years 11 months ago
Fair Computation of General Functions in Presence of Immoral Majority
This paper describes a method for n players, a majority of which may be faulty, to compute correctly, privately, and fairly any computable function f(Xl, ...,x,) where xi is the i...
Shafi Goldwasser, Leonid A. Levin