Letteratura scientifica selezionata sul tema "Oblivious transfer protocols"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Oblivious transfer protocols".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Oblivious transfer protocols"
Sikora, Jamie. "On the existence of loss-tolerant quantum oblivious transfer protocols". Quantum Information and Computation 12, n. 7&8 (luglio 2012): 609–19. http://dx.doi.org/10.26421/qic12.7-8-6.
Testo completoNikov, Ventzislav, Svetla Nikova e Bart Preneel. "On Distributed Oblivious Transfer". Serdica Journal of Computing 1, n. 3 (26 settembre 2007): 313–36. http://dx.doi.org/10.55630/sjc.2007.1.313-336.
Testo completoCosta, Bruno, Pedro Branco, Manuel Goulão, Mariano Lemus e Paulo Mateus. "Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting". Entropy 23, n. 8 (31 luglio 2021): 1001. http://dx.doi.org/10.3390/e23081001.
Testo completoChailloux, Andre, Iordanis Kerenidis e Jamie Sikora. "Lower bounds for quantum oblivious transfer". Quantum Information and Computation 13, n. 1&2 (gennaio 2013): 158–77. http://dx.doi.org/10.26421/qic13.1-2-9.
Testo completoSong, Yaqi, e Li Yang. "Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer". Applied Sciences 8, n. 10 (19 ottobre 2018): 1990. http://dx.doi.org/10.3390/app8101990.
Testo completoDanoyan, D. H. "EXTENDING WHITE-BOX CRYPTOGRAPHY BASED OBLIVIOUS TRANSFER PROTOCOL". Proceedings of the YSU A: Physical and Mathematical Sciences 50, n. 1 (239) (18 marzo 2016): 40–44. http://dx.doi.org/10.46991/psyu:a/2016.50.1.040.
Testo completoKundu, Srijita, Jamie Sikora e Ernest Y. Z. Tan. "A device-independent protocol for XOR oblivious transfer". Quantum 6 (30 maggio 2022): 725. http://dx.doi.org/10.22331/q-2022-05-30-725.
Testo completoLi, Zengpeng, Can Xiang e Chengyu Wang. "Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography". Wireless Communications and Mobile Computing 2018 (2 settembre 2018): 1–11. http://dx.doi.org/10.1155/2018/5973285.
Testo completoSantos, Manuel B., Paulo Mateus e Armando N. Pinto. "Quantum Oblivious Transfer: A Short Review". Entropy 24, n. 7 (7 luglio 2022): 945. http://dx.doi.org/10.3390/e24070945.
Testo completoINOUE, Daisuke, e Keisuke TANAKA. "Symmetricity of the Protocols Related to Oblivious Transfer". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, n. 1 (2009): 217–21. http://dx.doi.org/10.1587/transfun.e92.a.217.
Testo completoTesi sul tema "Oblivious transfer protocols"
Zhang, Jun Qi, University of Western Sydney, of Science Technology and Environment College e School of Computing and Information Technology. "Oblivious transfer protocols for securing electronic commerce". THESIS_CSTE_CIT_Zhang_J.xml, 2002. http://handle.uws.edu.au:8081/1959.7/289.
Testo completoMaster of Science (Hons)
Zhang, Jun Qi. "Oblivious transfer protocols for securing electronic commerce". Thesis, View thesis View thesis, 2002. http://handle.uws.edu.au:8081/1959.7/289.
Testo completoZhang, Jun Qi. "Oblivious transfer protocols for securing electronic commerce /". View thesis View thesis, 2002. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030417.113506/index.html.
Testo completoVega, Enrique Larraia de. "Universally composable protocols for multi-party computation and oblivious transfer". Thesis, University of Bristol, 2015. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.689689.
Testo completoChailloux, André. "Quantum coin flipping and bit commitment : optimal bounds, pratical constructions and computational security". Thesis, Paris 11, 2011. http://www.theses.fr/2011PA112121/document.
Testo completoQuantum computing allows us to revisit the study of quantum cryptographic primitives with information theoretic security. In 1984, Bennett and Brassard presented a protocol of quantum key distribution. In this protocol, Alice and Bob cooperate in order to share a common secret key k, which has to be unknown for a third party that has access to the communication channel. They showed how to perform this task quantumly with an information theoretic security; which is impossible classically.In my thesis, I study cryptographic primitives with two players that do not trust each other. I study mainly coin flipping and bit commitment. Classically, both these primitives are impossible classically with information theoretic security. Quantum protocols for these primitives where constructed where cheating players could cheat with probability stricly smaller than 1. However, Lo, Chau and Mayers showed that these primitives are impossible to achieve perfectly even quantumly if one requires information theoretic security. I study to what extent imperfect protocols can be done in this setting.In the first part, I construct a quantum coin flipping protocol with cheating probabitlity of 1/root(2) + eps for any eps > 0. This completes a result by Kitaev who showed that in any quantum coin flipping protocol, one of the players can cheat with probability at least 1/root(2). I also constructed a quantum bit commitment protocol with cheating probability 0.739 + eps for any eps > 0 and showed that this protocol is essentially optimal. I also derived some upper and lower bounds for quantum oblivious transfer, which is a universal cryptographic primitive.In the second part, I study some practical aspects related to these primitives. I take into account losses than can occur when measuring a quantum state. I construct a Quantum Coin Flipping and Quantum Bit Commitment protocols which are loss-tolerant and have cheating probabilities of 0.859. I also construct these primitives in the device independent model, where the players do not trust their quantum device. Finally, in the third part, I study these cryptographic primitives with information theoretic security. More precisely, I study the relationship between computational quantum bit commitment and quantum zero-knowledge protocols
JYUN-YI-LI e 李俊毅. "Oblivious Transfer Protocols Based on Elliptic Curve Cryptography". Thesis, 2008. http://ndltd.ncl.edu.tw/handle/69881759803951037443.
Testo completo南台科技大學
資訊管理系
96
Oblivious transfer protocol is an important research topic in the field of cryptography. It includes two parties: Sender and Receiver, where sender wants to convey secret values to receiver, and receiver can choose the secret value he wanted. But the sender cannot know which secret value the receiver chose. Moreover, the receiver cannot get any secret values that he did not choose. According to the amount of secret values that the sender holds and the receiver can choose, oblivious transfer protocols can be classified as all or nothing oblivious transfer protocols, 1 out of 2 oblivious transfer protocols, 1 out of n oblivious transfer protocols and t out of n oblivious transfer protocols. However, only 1 out of 2 oblivious transfer protocols based on elliptic curve cryptography are designed. Therefore, this essay will propose 1 out of n oblivious transfer protocol and t out of n oblivious transfer protocol based on elliptic curve cryptography to enhance the effects and extend the applied environments.
Lin, Chi-Shin, e 林其新. "Design and Analysis of Efficient k-out-of-n Oblivious Transfer and Priced Oblivious Transfer Protocols". Thesis, 2005. http://ndltd.ncl.edu.tw/handle/06460745449799663255.
Testo completo國立嘉義大學
資訊工程研究所
93
The oblivious transfer has a critical problem on the sender’s communication complexity. Therefore, in this thesis, we develop an efficient k-out-of-n Oblivious Transfer whose result is superior to all previous solutions in terms of sender’s communication complexity. In our k-out-of-n Oblivious Transfer protocol, the sender cannot determine which k secret messages the receiver received, and the receiver cannot get the other remaining n-k secret messages if solving the factorization problem is hard. When k=1, we particularly suggest an efficient solution. The priced oblivious transfer which can be applied to sell digital goods, was introduced by Aiello et al. However, in the previous work, such as Aiello et al.’s and Tobias’s papers, a customer buys only one item in each transaction but must receive n ciphertexts from the vendor, which is inefficient because of increasing n-1 non-essential transmissions. For this reason, we present an efficient priced k-out-of-n scheme. In our scheme, the communication cost of the vendor can be greatly reduced.
Corniaux, Christian L. F. "Exploratory designs of unconditionally secure distributed oblivious transfer protocols". Thesis, 2016. https://researchonline.jcu.edu.au/43771/1/43771-corniaux-2016-thesis.pdf.
Testo completoChang, Tyng-Kwei, e 張庭魁. "Researches of Quantum Key Distribution and Quantum Oblivious Transfer Protocols". Thesis, 2005. http://ndltd.ncl.edu.tw/handle/88826602125242601048.
Testo completo南台科技大學
資訊管理系
93
Due to the rapid development of information technology, data communication is more frequent in the network. When two parties need to communicate in secret, they have to share a secret key in advance. The sender encrypts data, and then delivers it to the receiver. The receiver decrypts it using the same secret key. They can share the secret key by public key cryptography. In order to against breaking, the length of the secret key has to be increased. However, even the length of the secret key is long, they still cannot against the attacks of quantum computers. Fortunately, Bennett and Brassard in 1984 proposed a BB84 quantum key distribution protocol, which is secure from the attack of quantum computers. Since BB84 protocol, the communication security has stepped forward to a new milestone. However, the key sharing efficiency is only 50% in BB84 protocol. Therefore, this master thesis will propose two new protocols: The first one is Bases Probability Adjustment (BPA); The second one is Preset Bases Quantum Key Distribution Protocol. These two protocols can improve the key sharing efficiency without affecting the security of BB84. Another research topic of this master thesis is quantum oblivious transfer. It will introduce Crépeau’s 1-out-of-2 quantum oblivious transfer protocol in 1994, and show how to use quantum bit commitment mechanism to prevent the storage attack. This thesis also proposes 1-out-of-2, 1-out-of-n, and m-out-of-n quantum oblivious transfer protocols.
Lin, Chi-Hsuan, e 林季玄. "Reusable Oblivious Transfer Protocol". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/62876393658199007448.
Testo completo南台科技大學
資訊管理系
94
Oblivious transfer is an important and basic technique in the field of cryptography. Basically, an oblivious transfer protocol includes two parties, Sender and Receiver. Sender has many secrets, and Receiver can freely choose one from those secrets. However, Receiver’s choice is a secret to Sender; Receiver learns nothing from the other secrets. Oblivious transfer protocols can be applied to private information retrieval, exchange secret, fair electronic contract signing, and Internet auction. Oblivious transfer protocols often need to be reused in many applications. After the initial phase of oblivious transfer protocols is completed and the initial parameters can be used repeatedly, the computation cost and transmission cost will be reduced. However, some security problems could be appeared because of reuse. In 2005, Huang and Chang proposed an efficient t-out-of-n oblivious transfer protocol, but this protocol suffers from the un-chosen message replay attack. This thesis will propose a reusable oblivious transfer protocol, which can resist the un-chosen message replay attack. Besides, Wu, Zhang, and Wang in 2003 proposed another t-out-of-n oblivious transfer protocol, which mentioned it cannot efficiently prevent the man-in-the-middle attack in an insecure channel. Hence, this study proposes two authenticated oblivious transfer protocols. One is an oblivious transfer protocol with explicated user authentication, and the other is an oblivious transfer protocol with implicated user authentication. Both protocols can efficiently avoid man-in-the-middle attack.
Capitoli di libri sul tema "Oblivious transfer protocols"
Hazay, Carmit, e Yehuda Lindell. "Oblivious Transfer and Applications". In Efficient Secure Two-Party Protocols, 177–212. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14303-8_7.
Testo completoZhu, Huafei. "Round Optimal Universally Composable Oblivious Transfer Protocols". In Provable Security, 328–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88733-1_23.
Testo completoLi, Baiyu, e Daniele Micciancio. "Equational Security Proofs of Oblivious Transfer Protocols". In Public-Key Cryptography – PKC 2018, 527–53. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76578-5_18.
Testo completoGoyal, Vipul, Abhishek Jain, Zhengzhong Jin e Giulio Malavolta. "Statistical Zaps and New Oblivious Transfer Protocols". In Advances in Cryptology – EUROCRYPT 2020, 668–99. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45727-3_23.
Testo completoYao, Gang, Feng Bao e Robert H. Deng. "Security Analysis of Three Oblivious Transfer Protocols". In Coding, Cryptography and Combinatorics, 385–96. Basel: Birkhäuser Basel, 2004. http://dx.doi.org/10.1007/978-3-0348-7865-4_27.
Testo completoLi, Jing, Xiong Li, Licheng Wang, Debiao He e Xinxin Niu. "Oblivious Transfer Protocols Based on Group Factoring Problem". In Advances on Broad-Band Wireless Computing, Communication and Applications, 885–92. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49106-6_90.
Testo completoZhu, Huafei, e Feng Bao. "Adaptive and Composable Oblivious Transfer Protocols (Short Paper)". In Information and Communications Security, 483–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-11145-7_38.
Testo completoKorjik, Valeri, e Kirill Morozov. "Generalized Oblivious Transfer Protocols Based on Noisy Channels". In Information Assurance in Computer Networks, 219–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45116-1_22.
Testo completoVitse, Vanessa. "Simple Oblivious Transfer Protocols Compatible with Supersingular Isogenies". In Progress in Cryptology – AFRICACRYPT 2019, 56–78. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23696-0_4.
Testo completoZhu, Huafei. "Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols". In Cryptology and Network Security, 214–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89641-8_15.
Testo completoAtti di convegni sul tema "Oblivious transfer protocols"
Pinto, Adriana C. B., Bernardo Machado David, Jeroen van de Graaf e Anderson C. A. Nascimento. "Universally Composable Committed Oblivious Transfer With A Trusted Initializer". In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2012. http://dx.doi.org/10.5753/sbseg.2012.20541.
Testo completoQin, Jing, Zhao Hua-wei e Wang Ming-Qiang. "Non-interactive Oblivious Transfer Protocols". In 2009 International Forum on Information Technology and Applications (IFITA). IEEE, 2009. http://dx.doi.org/10.1109/ifita.2009.180.
Testo completoDavid, Bernardo M., Anderson C. A. Nascimento e Rafael Tonicelli. "Obtaining Efficient Fully Simulatable Oblivious Transfer from General Assumptions". In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2011. http://dx.doi.org/10.5753/sbseg.2011.20567.
Testo completoHsu, Jen-Chieh, Raylin Tso, Yu-Chi Chen e Mu-En Wu. "Oblivious Transfer Protocols Based on Commutative Encryption". In 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2018. http://dx.doi.org/10.1109/ntms.2018.8328707.
Testo completoQin, J., J. Hu e H. Zhao. "Simulatable Oblivious Transfer Protocols Based on Blind Signature". In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. http://dx.doi.org/10.1109/trustcom.2012.263.
Testo completoWang, Shiuh-Jeng, Yuh-Ren Tsai e Chien-Chih Shen. "Varied Oblivious Transfer Protocols Enabling Multi-receiver and Applications". In 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA 2010). IEEE, 2010. http://dx.doi.org/10.1109/bwcca.2010.103.
Testo completoBarreto, Paulo, Gláucio Oliveira, Waldyr Benits e Anderson Nascimento. "Supersingular Isogeny Oblivious Transfer". In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13965.
Testo completoYao Gang e Feng Dengguo. "Proxy oblivious transfer protocol". In First International Conference on Availability, Reliability and Security (ARES'06). IEEE, 2006. http://dx.doi.org/10.1109/ares.2006.101.
Testo completoParakh, Abhishek. "A quantum oblivious transfer protocol". In SPIE Optical Engineering + Applications, a cura di Chandrasekhar Roychoudhuri, Al F. Kracklauer e Hans De Raedt. SPIE, 2013. http://dx.doi.org/10.1117/12.2024305.
Testo completoDavid, Bernardo M., Anderson C. A. Nascimento e Rodrigo B. Nogueira. "Oblivious Transfer Based on the McEliece Assumptions with Unconditional Security for the Sender". In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2010. http://dx.doi.org/10.5753/sbseg.2010.20584.
Testo completo