Journal articles on the topic 'Oblivious transfer protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Oblivious transfer protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sikora, Jamie. "On the existence of loss-tolerant quantum oblivious transfer protocols." Quantum Information and Computation 12, no. 7&8 (July 2012): 609–19. http://dx.doi.org/10.26421/qic12.7-8-6.
Full textNikov, Ventzislav, Svetla Nikova, and Bart Preneel. "On Distributed Oblivious Transfer." Serdica Journal of Computing 1, no. 3 (September 26, 2007): 313–36. http://dx.doi.org/10.55630/sjc.2007.1.313-336.
Full textCosta, Bruno, Pedro Branco, Manuel Goulão, Mariano Lemus, and Paulo Mateus. "Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting." Entropy 23, no. 8 (July 31, 2021): 1001. http://dx.doi.org/10.3390/e23081001.
Full textChailloux, Andre, Iordanis Kerenidis, and Jamie Sikora. "Lower bounds for quantum oblivious transfer." Quantum Information and Computation 13, no. 1&2 (January 2013): 158–77. http://dx.doi.org/10.26421/qic13.1-2-9.
Full textSong, Yaqi, and Li Yang. "Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer." Applied Sciences 8, no. 10 (October 19, 2018): 1990. http://dx.doi.org/10.3390/app8101990.
Full textDanoyan, D. H. "EXTENDING WHITE-BOX CRYPTOGRAPHY BASED OBLIVIOUS TRANSFER PROTOCOL." Proceedings of the YSU A: Physical and Mathematical Sciences 50, no. 1 (239) (March 18, 2016): 40–44. http://dx.doi.org/10.46991/psyu:a/2016.50.1.040.
Full textKundu, Srijita, Jamie Sikora, and Ernest Y. Z. Tan. "A device-independent protocol for XOR oblivious transfer." Quantum 6 (May 30, 2022): 725. http://dx.doi.org/10.22331/q-2022-05-30-725.
Full textLi, Zengpeng, Can Xiang, and Chengyu Wang. "Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography." Wireless Communications and Mobile Computing 2018 (September 2, 2018): 1–11. http://dx.doi.org/10.1155/2018/5973285.
Full textSantos, Manuel B., Paulo Mateus, and Armando N. Pinto. "Quantum Oblivious Transfer: A Short Review." Entropy 24, no. 7 (July 7, 2022): 945. http://dx.doi.org/10.3390/e24070945.
Full textINOUE, Daisuke, and Keisuke TANAKA. "Symmetricity of the Protocols Related to Oblivious Transfer." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, no. 1 (2009): 217–21. http://dx.doi.org/10.1587/transfun.e92.a.217.
Full textDowsley, Rafael, Jörn Müller-Quade, and Anderson C. A. Nascimento. "On the Composability of Statistically Secure Random Oblivious Transfer." Entropy 22, no. 1 (January 16, 2020): 107. http://dx.doi.org/10.3390/e22010107.
Full textSchaffner, C., B. Terhal, and S. Wehner. "Robust cryptography in the noisy-quantum-storage model." Quantum Information and Computation 9, no. 11&12 (November 2009): 963–96. http://dx.doi.org/10.26421/qic9.11-12-4.
Full textTueno, Anselme, Florian Kerschbaum, and Stefan Katzenbeisser. "Private Evaluation of Decision Trees using Sublinear Cost." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (January 1, 2019): 266–86. http://dx.doi.org/10.2478/popets-2019-0015.
Full textZhao, Shengnan, Xiangfu Song, Han Jiang, Ming Ma, Zhihua Zheng, and Qiuliang Xu. "An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications." Security and Communication Networks 2020 (December 5, 2020): 1–12. http://dx.doi.org/10.1155/2020/8847487.
Full textKiayias, Aggelos, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, and Qiang Tang. "Optimal Rate Private Information Retrieval from Homomorphic Encryption." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (June 1, 2015): 222–43. http://dx.doi.org/10.1515/popets-2015-0016.
Full textGancher, Joshua, Kristina Sojakova, Xiong Fan, Elaine Shi, and Greg Morrisett. "A Core Calculus for Equational Proofs of Cryptographic Protocols." Proceedings of the ACM on Programming Languages 7, POPL (January 9, 2023): 866–92. http://dx.doi.org/10.1145/3571223.
Full textChou, Jue-Sam. "A Novelk-out-of-nOblivious Transfer Protocol from Bilinear Pairing." Advances in Multimedia 2012 (2012): 1–9. http://dx.doi.org/10.1155/2012/630610.
Full textSalvail, Louis, Christian Schaffner, and Miroslava Sotáková. "Quantifying the leakage of quantum protocols for classical two-party cryptography." International Journal of Quantum Information 13, no. 04 (December 5, 2014): 1450041. http://dx.doi.org/10.1142/s0219749914500415.
Full textRührmair, Ulrich, and Marten van Dijk. "On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols." Journal of Cryptographic Engineering 3, no. 1 (March 26, 2013): 17–28. http://dx.doi.org/10.1007/s13389-013-0052-8.
Full textSchmitt, Paul, Anne Edmundson, Allison Mankin, and Nick Feamster. "Oblivious DNS: Practical Privacy for DNS Queries." Proceedings on Privacy Enhancing Technologies 2019, no. 2 (April 1, 2019): 228–44. http://dx.doi.org/10.2478/popets-2019-0028.
Full textMohanty, Suneeta, Prasant Kumar Pattnaik, and G. B. Mund. "Privacy Preserving Auction Based Virtual Machine Instances Allocation Scheme for Cloud Computing Environment." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 5 (October 1, 2017): 2645. http://dx.doi.org/10.11591/ijece.v7i5.pp2645-2650.
Full textGutoski, Gus, Ansis Rosmanis, and Jamie Sikora. "Fidelity of quantum strategies with applications to cryptography." Quantum 2 (September 3, 2018): 89. http://dx.doi.org/10.22331/q-2018-09-03-89.
Full textWagh, Sameer. "Pika: Secure Computation using Function Secret Sharing over Rings." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 351–77. http://dx.doi.org/10.56553/popets-2022-0113.
Full textLi, Yang, Hongtao Song, Yunlong Zhao, Nianmin Yao, and Nianbin Wang. "Anonymous Data Reporting Strategy with Dynamic Incentive Mechanism for Participatory Sensing." Security and Communication Networks 2021 (June 1, 2021): 1–20. http://dx.doi.org/10.1155/2021/5518168.
Full textBraun, Lennart, Daniel Demmler, Thomas Schneider, and Oleksandr Tkachenko. "MOTION – A Framework for Mixed-Protocol Multi-Party Computation." ACM Transactions on Privacy and Security 25, no. 2 (May 31, 2022): 1–35. http://dx.doi.org/10.1145/3490390.
Full textYang, Songtao, and Qingfeng Jiang. "Towards Region Queries with Strong Location Privacy in Mobile Network." Mobile Information Systems 2021 (November 18, 2021): 1–12. http://dx.doi.org/10.1155/2021/5972486.
Full textWagh, Sameer, Divya Gupta, and Nishanth Chandran. "SecureNN: 3-Party Secure Computation for Neural Network Training." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 26–49. http://dx.doi.org/10.2478/popets-2019-0035.
Full textLEE, N. Y. "Verifiable Oblivious Transfer Protocol." IEICE Transactions on Information and Systems E88-D, no. 12 (December 1, 2005): 2890–92. http://dx.doi.org/10.1093/ietisy/e88-d.12.2890.
Full textZheng, Yuan, Wang Mei, and Feng Xiao. "Secure oblivious transfer protocol from indistinguishability obfuscation." Journal of China Universities of Posts and Telecommunications 23, no. 3 (June 2016): 1–10. http://dx.doi.org/10.1016/s1005-8885(16)60026-2.
Full textGenç, Ziya Alper, Vincenzo Iovino, and Alfredo Rial. "“The simplest protocol for oblivious transfer” revisited." Information Processing Letters 161 (September 2020): 105975. http://dx.doi.org/10.1016/j.ipl.2020.105975.
Full textSong, Jiashuo, Dongfei Wang, Zhenzhen Zhang, Zhenzhen Li, Haiyang Ding, and Zichen Li. "Universally Composable Oblivious Transfer with Low Communication." Applied Sciences 13, no. 4 (February 6, 2023): 2090. http://dx.doi.org/10.3390/app13042090.
Full textYu, Li, and Jun Yao Ye. "Analysis on A 1-out-n Security Protocol Based on Threshold Idea." Advanced Materials Research 605-607 (December 2012): 2329–32. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.2329.
Full textLemus, Mariano, Mariana F. Ramos, Preeti Yadav, Nuno A. Silva, Nelson J. Muga, André Souto, Nikola Paunković, Paulo Mateus, and Armando N. Pinto. "Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation." Applied Sciences 10, no. 12 (June 12, 2020): 4080. http://dx.doi.org/10.3390/app10124080.
Full textGuo, Xiao Qiang, Yan Yan, Hong Wang, and Yi Shuo Shi. "Study on Quantum Oblivious Transfer." Applied Mechanics and Materials 263-266 (December 2012): 3079–82. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3079.
Full textLi, Yan-Bing, Qiao-Yan Wen, Su-Juan Qin, Fen-Zhuo Guo, and Ying Sun. "Practical quantum all-or-nothing oblivious transfer protocol." Quantum Information Processing 13, no. 1 (February 26, 2013): 131–39. http://dx.doi.org/10.1007/s11128-013-0550-8.
Full textJia, Xi, and Meng Zhang. "Encrypted Packet Inspection Based on Oblivious Transfer." Security and Communication Networks 2022 (August 24, 2022): 1–13. http://dx.doi.org/10.1155/2022/4743078.
Full textYang, Penglin, Huizheng Geng, Li Su, Li Lu, and Tingting Yang. "BSOT: Bandwidth-saving oblivious transfer protocol with confidential computing." Journal of Physics: Conference Series 2387, no. 1 (November 1, 2022): 012008. http://dx.doi.org/10.1088/1742-6596/2387/1/012008.
Full textHe, Guang-Ping. "Coherent attacks on a practical quantum oblivious transfer protocol." Chinese Physics B 27, no. 10 (October 2018): 100308. http://dx.doi.org/10.1088/1674-1056/27/10/100308.
Full textFischer, M. J., S. Micali, and C. Rackoff. "A secure protocol for the oblivious transfer (extended abstract)." Journal of Cryptology 9, no. 3 (June 1996): 191–95. http://dx.doi.org/10.1007/bf00208002.
Full textSHINMYO, U., M. KURIBAYASHI, M. MORII, and H. TANAKA. "Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no. 10 (October 1, 2006): 2597–602. http://dx.doi.org/10.1093/ietfec/e89-a.10.2597.
Full textFischer, M. J., S. Micali, and C. Rackoff. "A Secure Protocol for the Oblivious Transfer (Extended Abstract)." Journal of Cryptology 9, no. 3 (1996): 191. http://dx.doi.org/10.1007/s001459900011.
Full textDing, Hangchao, Han Jiang, and Qiuliang Xu. "Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE." Security and Communication Networks 2021 (September 8, 2021): 1–15. http://dx.doi.org/10.1155/2021/9974604.
Full textLiu, Mo-meng, Juliane Krämer, Yu-pu Hu, and Johannes Buchmann. "Quantum security analysis of a lattice-based oblivious transfer protocol." Frontiers of Information Technology & Electronic Engineering 18, no. 9 (September 2017): 1348–69. http://dx.doi.org/10.1631/fitee.1700039.
Full textWang, Xiaotian, and Zichen Li. "Research on the security Oblivious Transfer protocol based on ECDDH." Journal of Physics: Conference Series 1549 (June 2020): 032152. http://dx.doi.org/10.1088/1742-6596/1549/3/032152.
Full textGuan, Albert, and Wen-Guey Tzeng. "A light-weight oblivious transfer protocol based on channel noise." International Journal of Computer Mathematics: Computer Systems Theory 2, no. 1 (January 2, 2017): 28–38. http://dx.doi.org/10.1080/23799927.2017.1323798.
Full textJain, Ashwin, and C. Hari. "A New Efficient Protocol for k-out-of-n Oblivious Transfer." Cryptologia 34, no. 4 (September 21, 2010): 282–90. http://dx.doi.org/10.1080/01611194.2010.509284.
Full textMi, Bo, Darong Huang, Shaohua Wan, Yu Hu, and Kim-Kwang Raymond Choo. "A post-quantum light weight 1-out-n oblivious transfer protocol." Computers & Electrical Engineering 75 (May 2019): 90–100. http://dx.doi.org/10.1016/j.compeleceng.2019.01.021.
Full textYajun Jiang, and Bo Yang. "A Privacy-preserving Digital Rights Management Protocol based on Oblivious Transfer Scheme." International Journal of Digital Content Technology and its Applications 5, no. 5 (May 31, 2011): 337–41. http://dx.doi.org/10.4156/jdcta.vol5.issue5.37.
Full textRial, Alfredo, Josep Balasch, and Bart Preneel. "A Privacy-Preserving Buyer–Seller Watermarking Protocol Based on Priced Oblivious Transfer." IEEE Transactions on Information Forensics and Security 6, no. 1 (March 2011): 202–12. http://dx.doi.org/10.1109/tifs.2010.2095844.
Full textWang, Qinglong, and Jintai Ding. "Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol." Cryptologia 38, no. 4 (August 30, 2014): 370–76. http://dx.doi.org/10.1080/01611194.2014.915261.
Full text