Literatura científica selecionada sobre o tema "Oblivious transfer protocols"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Oblivious transfer protocols".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Oblivious transfer protocols"
Sikora, Jamie. "On the existence of loss-tolerant quantum oblivious transfer protocols". Quantum Information and Computation 12, n.º 7&8 (julho de 2012): 609–19. http://dx.doi.org/10.26421/qic12.7-8-6.
Texto completo da fonteNikov, Ventzislav, Svetla Nikova e Bart Preneel. "On Distributed Oblivious Transfer". Serdica Journal of Computing 1, n.º 3 (26 de setembro de 2007): 313–36. http://dx.doi.org/10.55630/sjc.2007.1.313-336.
Texto completo da fonteCosta, Bruno, Pedro Branco, Manuel Goulão, Mariano Lemus e Paulo Mateus. "Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting". Entropy 23, n.º 8 (31 de julho de 2021): 1001. http://dx.doi.org/10.3390/e23081001.
Texto completo da fonteChailloux, Andre, Iordanis Kerenidis e Jamie Sikora. "Lower bounds for quantum oblivious transfer". Quantum Information and Computation 13, n.º 1&2 (janeiro de 2013): 158–77. http://dx.doi.org/10.26421/qic13.1-2-9.
Texto completo da fonteSong, Yaqi, e Li Yang. "Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer". Applied Sciences 8, n.º 10 (19 de outubro de 2018): 1990. http://dx.doi.org/10.3390/app8101990.
Texto completo da fonteDanoyan, D. H. "EXTENDING WHITE-BOX CRYPTOGRAPHY BASED OBLIVIOUS TRANSFER PROTOCOL". Proceedings of the YSU A: Physical and Mathematical Sciences 50, n.º 1 (239) (18 de março de 2016): 40–44. http://dx.doi.org/10.46991/psyu:a/2016.50.1.040.
Texto completo da fonteKundu, Srijita, Jamie Sikora e Ernest Y. Z. Tan. "A device-independent protocol for XOR oblivious transfer". Quantum 6 (30 de maio de 2022): 725. http://dx.doi.org/10.22331/q-2022-05-30-725.
Texto completo da fonteLi, Zengpeng, Can Xiang e Chengyu Wang. "Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography". Wireless Communications and Mobile Computing 2018 (2 de setembro de 2018): 1–11. http://dx.doi.org/10.1155/2018/5973285.
Texto completo da fonteSantos, Manuel B., Paulo Mateus e Armando N. Pinto. "Quantum Oblivious Transfer: A Short Review". Entropy 24, n.º 7 (7 de julho de 2022): 945. http://dx.doi.org/10.3390/e24070945.
Texto completo da fonteINOUE, Daisuke, e Keisuke TANAKA. "Symmetricity of the Protocols Related to Oblivious Transfer". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, n.º 1 (2009): 217–21. http://dx.doi.org/10.1587/transfun.e92.a.217.
Texto completo da fonteTeses / dissertações sobre o assunto "Oblivious transfer protocols"
Zhang, Jun Qi, University of Western Sydney, of Science Technology and Environment College e School of Computing and Information Technology. "Oblivious transfer protocols for securing electronic commerce". THESIS_CSTE_CIT_Zhang_J.xml, 2002. http://handle.uws.edu.au:8081/1959.7/289.
Texto completo da fonteMaster of Science (Hons)
Zhang, Jun Qi. "Oblivious transfer protocols for securing electronic commerce". Thesis, View thesis View thesis, 2002. http://handle.uws.edu.au:8081/1959.7/289.
Texto completo da fonteZhang, Jun Qi. "Oblivious transfer protocols for securing electronic commerce /". View thesis View thesis, 2002. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030417.113506/index.html.
Texto completo da fonteVega, Enrique Larraia de. "Universally composable protocols for multi-party computation and oblivious transfer". Thesis, University of Bristol, 2015. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.689689.
Texto completo da fonteChailloux, André. "Quantum coin flipping and bit commitment : optimal bounds, pratical constructions and computational security". Thesis, Paris 11, 2011. http://www.theses.fr/2011PA112121/document.
Texto completo da fonteQuantum computing allows us to revisit the study of quantum cryptographic primitives with information theoretic security. In 1984, Bennett and Brassard presented a protocol of quantum key distribution. In this protocol, Alice and Bob cooperate in order to share a common secret key k, which has to be unknown for a third party that has access to the communication channel. They showed how to perform this task quantumly with an information theoretic security; which is impossible classically.In my thesis, I study cryptographic primitives with two players that do not trust each other. I study mainly coin flipping and bit commitment. Classically, both these primitives are impossible classically with information theoretic security. Quantum protocols for these primitives where constructed where cheating players could cheat with probability stricly smaller than 1. However, Lo, Chau and Mayers showed that these primitives are impossible to achieve perfectly even quantumly if one requires information theoretic security. I study to what extent imperfect protocols can be done in this setting.In the first part, I construct a quantum coin flipping protocol with cheating probabitlity of 1/root(2) + eps for any eps > 0. This completes a result by Kitaev who showed that in any quantum coin flipping protocol, one of the players can cheat with probability at least 1/root(2). I also constructed a quantum bit commitment protocol with cheating probability 0.739 + eps for any eps > 0 and showed that this protocol is essentially optimal. I also derived some upper and lower bounds for quantum oblivious transfer, which is a universal cryptographic primitive.In the second part, I study some practical aspects related to these primitives. I take into account losses than can occur when measuring a quantum state. I construct a Quantum Coin Flipping and Quantum Bit Commitment protocols which are loss-tolerant and have cheating probabilities of 0.859. I also construct these primitives in the device independent model, where the players do not trust their quantum device. Finally, in the third part, I study these cryptographic primitives with information theoretic security. More precisely, I study the relationship between computational quantum bit commitment and quantum zero-knowledge protocols
JYUN-YI-LI e 李俊毅. "Oblivious Transfer Protocols Based on Elliptic Curve Cryptography". Thesis, 2008. http://ndltd.ncl.edu.tw/handle/69881759803951037443.
Texto completo da fonte南台科技大學
資訊管理系
96
Oblivious transfer protocol is an important research topic in the field of cryptography. It includes two parties: Sender and Receiver, where sender wants to convey secret values to receiver, and receiver can choose the secret value he wanted. But the sender cannot know which secret value the receiver chose. Moreover, the receiver cannot get any secret values that he did not choose. According to the amount of secret values that the sender holds and the receiver can choose, oblivious transfer protocols can be classified as all or nothing oblivious transfer protocols, 1 out of 2 oblivious transfer protocols, 1 out of n oblivious transfer protocols and t out of n oblivious transfer protocols. However, only 1 out of 2 oblivious transfer protocols based on elliptic curve cryptography are designed. Therefore, this essay will propose 1 out of n oblivious transfer protocol and t out of n oblivious transfer protocol based on elliptic curve cryptography to enhance the effects and extend the applied environments.
Lin, Chi-Shin, e 林其新. "Design and Analysis of Efficient k-out-of-n Oblivious Transfer and Priced Oblivious Transfer Protocols". Thesis, 2005. http://ndltd.ncl.edu.tw/handle/06460745449799663255.
Texto completo da fonte國立嘉義大學
資訊工程研究所
93
The oblivious transfer has a critical problem on the sender’s communication complexity. Therefore, in this thesis, we develop an efficient k-out-of-n Oblivious Transfer whose result is superior to all previous solutions in terms of sender’s communication complexity. In our k-out-of-n Oblivious Transfer protocol, the sender cannot determine which k secret messages the receiver received, and the receiver cannot get the other remaining n-k secret messages if solving the factorization problem is hard. When k=1, we particularly suggest an efficient solution. The priced oblivious transfer which can be applied to sell digital goods, was introduced by Aiello et al. However, in the previous work, such as Aiello et al.’s and Tobias’s papers, a customer buys only one item in each transaction but must receive n ciphertexts from the vendor, which is inefficient because of increasing n-1 non-essential transmissions. For this reason, we present an efficient priced k-out-of-n scheme. In our scheme, the communication cost of the vendor can be greatly reduced.
Corniaux, Christian L. F. "Exploratory designs of unconditionally secure distributed oblivious transfer protocols". Thesis, 2016. https://researchonline.jcu.edu.au/43771/1/43771-corniaux-2016-thesis.pdf.
Texto completo da fonteChang, Tyng-Kwei, e 張庭魁. "Researches of Quantum Key Distribution and Quantum Oblivious Transfer Protocols". Thesis, 2005. http://ndltd.ncl.edu.tw/handle/88826602125242601048.
Texto completo da fonte南台科技大學
資訊管理系
93
Due to the rapid development of information technology, data communication is more frequent in the network. When two parties need to communicate in secret, they have to share a secret key in advance. The sender encrypts data, and then delivers it to the receiver. The receiver decrypts it using the same secret key. They can share the secret key by public key cryptography. In order to against breaking, the length of the secret key has to be increased. However, even the length of the secret key is long, they still cannot against the attacks of quantum computers. Fortunately, Bennett and Brassard in 1984 proposed a BB84 quantum key distribution protocol, which is secure from the attack of quantum computers. Since BB84 protocol, the communication security has stepped forward to a new milestone. However, the key sharing efficiency is only 50% in BB84 protocol. Therefore, this master thesis will propose two new protocols: The first one is Bases Probability Adjustment (BPA); The second one is Preset Bases Quantum Key Distribution Protocol. These two protocols can improve the key sharing efficiency without affecting the security of BB84. Another research topic of this master thesis is quantum oblivious transfer. It will introduce Crépeau’s 1-out-of-2 quantum oblivious transfer protocol in 1994, and show how to use quantum bit commitment mechanism to prevent the storage attack. This thesis also proposes 1-out-of-2, 1-out-of-n, and m-out-of-n quantum oblivious transfer protocols.
Lin, Chi-Hsuan, e 林季玄. "Reusable Oblivious Transfer Protocol". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/62876393658199007448.
Texto completo da fonte南台科技大學
資訊管理系
94
Oblivious transfer is an important and basic technique in the field of cryptography. Basically, an oblivious transfer protocol includes two parties, Sender and Receiver. Sender has many secrets, and Receiver can freely choose one from those secrets. However, Receiver’s choice is a secret to Sender; Receiver learns nothing from the other secrets. Oblivious transfer protocols can be applied to private information retrieval, exchange secret, fair electronic contract signing, and Internet auction. Oblivious transfer protocols often need to be reused in many applications. After the initial phase of oblivious transfer protocols is completed and the initial parameters can be used repeatedly, the computation cost and transmission cost will be reduced. However, some security problems could be appeared because of reuse. In 2005, Huang and Chang proposed an efficient t-out-of-n oblivious transfer protocol, but this protocol suffers from the un-chosen message replay attack. This thesis will propose a reusable oblivious transfer protocol, which can resist the un-chosen message replay attack. Besides, Wu, Zhang, and Wang in 2003 proposed another t-out-of-n oblivious transfer protocol, which mentioned it cannot efficiently prevent the man-in-the-middle attack in an insecure channel. Hence, this study proposes two authenticated oblivious transfer protocols. One is an oblivious transfer protocol with explicated user authentication, and the other is an oblivious transfer protocol with implicated user authentication. Both protocols can efficiently avoid man-in-the-middle attack.
Capítulos de livros sobre o assunto "Oblivious transfer protocols"
Hazay, Carmit, e Yehuda Lindell. "Oblivious Transfer and Applications". In Efficient Secure Two-Party Protocols, 177–212. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14303-8_7.
Texto completo da fonteZhu, Huafei. "Round Optimal Universally Composable Oblivious Transfer Protocols". In Provable Security, 328–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88733-1_23.
Texto completo da fonteLi, Baiyu, e Daniele Micciancio. "Equational Security Proofs of Oblivious Transfer Protocols". In Public-Key Cryptography – PKC 2018, 527–53. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76578-5_18.
Texto completo da fonteGoyal, Vipul, Abhishek Jain, Zhengzhong Jin e Giulio Malavolta. "Statistical Zaps and New Oblivious Transfer Protocols". In Advances in Cryptology – EUROCRYPT 2020, 668–99. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45727-3_23.
Texto completo da fonteYao, Gang, Feng Bao e Robert H. Deng. "Security Analysis of Three Oblivious Transfer Protocols". In Coding, Cryptography and Combinatorics, 385–96. Basel: Birkhäuser Basel, 2004. http://dx.doi.org/10.1007/978-3-0348-7865-4_27.
Texto completo da fonteLi, Jing, Xiong Li, Licheng Wang, Debiao He e Xinxin Niu. "Oblivious Transfer Protocols Based on Group Factoring Problem". In Advances on Broad-Band Wireless Computing, Communication and Applications, 885–92. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49106-6_90.
Texto completo da fonteZhu, Huafei, e Feng Bao. "Adaptive and Composable Oblivious Transfer Protocols (Short Paper)". In Information and Communications Security, 483–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-11145-7_38.
Texto completo da fonteKorjik, Valeri, e Kirill Morozov. "Generalized Oblivious Transfer Protocols Based on Noisy Channels". In Information Assurance in Computer Networks, 219–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45116-1_22.
Texto completo da fonteVitse, Vanessa. "Simple Oblivious Transfer Protocols Compatible with Supersingular Isogenies". In Progress in Cryptology – AFRICACRYPT 2019, 56–78. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23696-0_4.
Texto completo da fonteZhu, Huafei. "Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols". In Cryptology and Network Security, 214–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89641-8_15.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Oblivious transfer protocols"
Pinto, Adriana C. B., Bernardo Machado David, Jeroen van de Graaf e Anderson C. A. Nascimento. "Universally Composable Committed Oblivious Transfer With A Trusted Initializer". In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2012. http://dx.doi.org/10.5753/sbseg.2012.20541.
Texto completo da fonteQin, Jing, Zhao Hua-wei e Wang Ming-Qiang. "Non-interactive Oblivious Transfer Protocols". In 2009 International Forum on Information Technology and Applications (IFITA). IEEE, 2009. http://dx.doi.org/10.1109/ifita.2009.180.
Texto completo da fonteDavid, Bernardo M., Anderson C. A. Nascimento e Rafael Tonicelli. "Obtaining Efficient Fully Simulatable Oblivious Transfer from General Assumptions". In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2011. http://dx.doi.org/10.5753/sbseg.2011.20567.
Texto completo da fonteHsu, Jen-Chieh, Raylin Tso, Yu-Chi Chen e Mu-En Wu. "Oblivious Transfer Protocols Based on Commutative Encryption". In 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2018. http://dx.doi.org/10.1109/ntms.2018.8328707.
Texto completo da fonteQin, J., J. Hu e H. Zhao. "Simulatable Oblivious Transfer Protocols Based on Blind Signature". In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. http://dx.doi.org/10.1109/trustcom.2012.263.
Texto completo da fonteWang, Shiuh-Jeng, Yuh-Ren Tsai e Chien-Chih Shen. "Varied Oblivious Transfer Protocols Enabling Multi-receiver and Applications". In 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA 2010). IEEE, 2010. http://dx.doi.org/10.1109/bwcca.2010.103.
Texto completo da fonteBarreto, Paulo, Gláucio Oliveira, Waldyr Benits e Anderson Nascimento. "Supersingular Isogeny Oblivious Transfer". In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13965.
Texto completo da fonteYao Gang e Feng Dengguo. "Proxy oblivious transfer protocol". In First International Conference on Availability, Reliability and Security (ARES'06). IEEE, 2006. http://dx.doi.org/10.1109/ares.2006.101.
Texto completo da fonteParakh, Abhishek. "A quantum oblivious transfer protocol". In SPIE Optical Engineering + Applications, editado por Chandrasekhar Roychoudhuri, Al F. Kracklauer e Hans De Raedt. SPIE, 2013. http://dx.doi.org/10.1117/12.2024305.
Texto completo da fonteDavid, Bernardo M., Anderson C. A. Nascimento e Rodrigo B. Nogueira. "Oblivious Transfer Based on the McEliece Assumptions with Unconditional Security for the Sender". In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2010. http://dx.doi.org/10.5753/sbseg.2010.20584.
Texto completo da fonte