Academic literature on the topic 'Oblivious transfer protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Oblivious transfer protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Oblivious transfer protocols"
Sikora, Jamie. "On the existence of loss-tolerant quantum oblivious transfer protocols." Quantum Information and Computation 12, no. 7&8 (July 2012): 609–19. http://dx.doi.org/10.26421/qic12.7-8-6.
Full textNikov, Ventzislav, Svetla Nikova, and Bart Preneel. "On Distributed Oblivious Transfer." Serdica Journal of Computing 1, no. 3 (September 26, 2007): 313–36. http://dx.doi.org/10.55630/sjc.2007.1.313-336.
Full textCosta, Bruno, Pedro Branco, Manuel Goulão, Mariano Lemus, and Paulo Mateus. "Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting." Entropy 23, no. 8 (July 31, 2021): 1001. http://dx.doi.org/10.3390/e23081001.
Full textChailloux, Andre, Iordanis Kerenidis, and Jamie Sikora. "Lower bounds for quantum oblivious transfer." Quantum Information and Computation 13, no. 1&2 (January 2013): 158–77. http://dx.doi.org/10.26421/qic13.1-2-9.
Full textSong, Yaqi, and Li Yang. "Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer." Applied Sciences 8, no. 10 (October 19, 2018): 1990. http://dx.doi.org/10.3390/app8101990.
Full textDanoyan, D. H. "EXTENDING WHITE-BOX CRYPTOGRAPHY BASED OBLIVIOUS TRANSFER PROTOCOL." Proceedings of the YSU A: Physical and Mathematical Sciences 50, no. 1 (239) (March 18, 2016): 40–44. http://dx.doi.org/10.46991/psyu:a/2016.50.1.040.
Full textKundu, Srijita, Jamie Sikora, and Ernest Y. Z. Tan. "A device-independent protocol for XOR oblivious transfer." Quantum 6 (May 30, 2022): 725. http://dx.doi.org/10.22331/q-2022-05-30-725.
Full textLi, Zengpeng, Can Xiang, and Chengyu Wang. "Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography." Wireless Communications and Mobile Computing 2018 (September 2, 2018): 1–11. http://dx.doi.org/10.1155/2018/5973285.
Full textSantos, Manuel B., Paulo Mateus, and Armando N. Pinto. "Quantum Oblivious Transfer: A Short Review." Entropy 24, no. 7 (July 7, 2022): 945. http://dx.doi.org/10.3390/e24070945.
Full textINOUE, Daisuke, and Keisuke TANAKA. "Symmetricity of the Protocols Related to Oblivious Transfer." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, no. 1 (2009): 217–21. http://dx.doi.org/10.1587/transfun.e92.a.217.
Full textDissertations / Theses on the topic "Oblivious transfer protocols"
Zhang, Jun Qi, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Oblivious transfer protocols for securing electronic commerce." THESIS_CSTE_CIT_Zhang_J.xml, 2002. http://handle.uws.edu.au:8081/1959.7/289.
Full textZhang, Jun Qi. "Oblivious transfer protocols for securing electronic commerce." Thesis, View thesis View thesis, 2002. http://handle.uws.edu.au:8081/1959.7/289.
Full textZhang, Jun Qi. "Oblivious transfer protocols for securing electronic commerce /." View thesis View thesis, 2002. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030417.113506/index.html.
Full textVega, Enrique Larraia de. "Universally composable protocols for multi-party computation and oblivious transfer." Thesis, University of Bristol, 2015. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.689689.
Full textChailloux, André. "Quantum coin flipping and bit commitment : optimal bounds, pratical constructions and computational security." Thesis, Paris 11, 2011. http://www.theses.fr/2011PA112121/document.
Full textJYUN-YI-LI and 李俊毅. "Oblivious Transfer Protocols Based on Elliptic Curve Cryptography." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/69881759803951037443.
Full textLin, Chi-Shin, and 林其新. "Design and Analysis of Efficient k-out-of-n Oblivious Transfer and Priced Oblivious Transfer Protocols." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/06460745449799663255.
Full textCorniaux, Christian L. F. "Exploratory designs of unconditionally secure distributed oblivious transfer protocols." Thesis, 2016. https://researchonline.jcu.edu.au/43771/1/43771-corniaux-2016-thesis.pdf.
Full textChang, Tyng-Kwei, and 張庭魁. "Researches of Quantum Key Distribution and Quantum Oblivious Transfer Protocols." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/88826602125242601048.
Full textLin, Chi-Hsuan, and 林季玄. "Reusable Oblivious Transfer Protocol." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/62876393658199007448.
Full textBook chapters on the topic "Oblivious transfer protocols"
Hazay, Carmit, and Yehuda Lindell. "Oblivious Transfer and Applications." In Efficient Secure Two-Party Protocols, 177–212. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14303-8_7.
Full textZhu, Huafei. "Round Optimal Universally Composable Oblivious Transfer Protocols." In Provable Security, 328–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88733-1_23.
Full textLi, Baiyu, and Daniele Micciancio. "Equational Security Proofs of Oblivious Transfer Protocols." In Public-Key Cryptography – PKC 2018, 527–53. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76578-5_18.
Full textGoyal, Vipul, Abhishek Jain, Zhengzhong Jin, and Giulio Malavolta. "Statistical Zaps and New Oblivious Transfer Protocols." In Advances in Cryptology – EUROCRYPT 2020, 668–99. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45727-3_23.
Full textYao, Gang, Feng Bao, and Robert H. Deng. "Security Analysis of Three Oblivious Transfer Protocols." In Coding, Cryptography and Combinatorics, 385–96. Basel: Birkhäuser Basel, 2004. http://dx.doi.org/10.1007/978-3-0348-7865-4_27.
Full textLi, Jing, Xiong Li, Licheng Wang, Debiao He, and Xinxin Niu. "Oblivious Transfer Protocols Based on Group Factoring Problem." In Advances on Broad-Band Wireless Computing, Communication and Applications, 885–92. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49106-6_90.
Full textZhu, Huafei, and Feng Bao. "Adaptive and Composable Oblivious Transfer Protocols (Short Paper)." In Information and Communications Security, 483–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-11145-7_38.
Full textKorjik, Valeri, and Kirill Morozov. "Generalized Oblivious Transfer Protocols Based on Noisy Channels." In Information Assurance in Computer Networks, 219–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45116-1_22.
Full textVitse, Vanessa. "Simple Oblivious Transfer Protocols Compatible with Supersingular Isogenies." In Progress in Cryptology – AFRICACRYPT 2019, 56–78. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23696-0_4.
Full textZhu, Huafei. "Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols." In Cryptology and Network Security, 214–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89641-8_15.
Full textConference papers on the topic "Oblivious transfer protocols"
Pinto, Adriana C. B., Bernardo Machado David, Jeroen van de Graaf, and Anderson C. A. Nascimento. "Universally Composable Committed Oblivious Transfer With A Trusted Initializer." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2012. http://dx.doi.org/10.5753/sbseg.2012.20541.
Full textQin, Jing, Zhao Hua-wei, and Wang Ming-Qiang. "Non-interactive Oblivious Transfer Protocols." In 2009 International Forum on Information Technology and Applications (IFITA). IEEE, 2009. http://dx.doi.org/10.1109/ifita.2009.180.
Full textDavid, Bernardo M., Anderson C. A. Nascimento, and Rafael Tonicelli. "Obtaining Efficient Fully Simulatable Oblivious Transfer from General Assumptions." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2011. http://dx.doi.org/10.5753/sbseg.2011.20567.
Full textHsu, Jen-Chieh, Raylin Tso, Yu-Chi Chen, and Mu-En Wu. "Oblivious Transfer Protocols Based on Commutative Encryption." In 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2018. http://dx.doi.org/10.1109/ntms.2018.8328707.
Full textQin, J., J. Hu, and H. Zhao. "Simulatable Oblivious Transfer Protocols Based on Blind Signature." In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. http://dx.doi.org/10.1109/trustcom.2012.263.
Full textWang, Shiuh-Jeng, Yuh-Ren Tsai, and Chien-Chih Shen. "Varied Oblivious Transfer Protocols Enabling Multi-receiver and Applications." In 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA 2010). IEEE, 2010. http://dx.doi.org/10.1109/bwcca.2010.103.
Full textBarreto, Paulo, Gláucio Oliveira, Waldyr Benits, and Anderson Nascimento. "Supersingular Isogeny Oblivious Transfer." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13965.
Full textYao Gang and Feng Dengguo. "Proxy oblivious transfer protocol." In First International Conference on Availability, Reliability and Security (ARES'06). IEEE, 2006. http://dx.doi.org/10.1109/ares.2006.101.
Full textParakh, Abhishek. "A quantum oblivious transfer protocol." In SPIE Optical Engineering + Applications, edited by Chandrasekhar Roychoudhuri, Al F. Kracklauer, and Hans De Raedt. SPIE, 2013. http://dx.doi.org/10.1117/12.2024305.
Full textDavid, Bernardo M., Anderson C. A. Nascimento, and Rodrigo B. Nogueira. "Oblivious Transfer Based on the McEliece Assumptions with Unconditional Security for the Sender." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2010. http://dx.doi.org/10.5753/sbseg.2010.20584.
Full text