메뉴 건너뛰기




Volumn 3352, Issue , 2005, Pages 47-59

Efficient unconditional oblivious transfer from almost any noisy channel

Author keywords

[No Author keywords available]

Indexed keywords

ACOUSTIC NOISE; COMMUNICATION SYSTEMS; NETWORK PROTOCOLS; PROBABILITY DISTRIBUTIONS;

EID: 23944515855     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30598-9_4     Document Type: Conference Paper
Times cited : (77)

References (24)
  • 4
    • 21144437147 scopus 로고    scopus 로고
    • Oblivious transfers and privacy amplification
    • Brassard, G., Crépeau, C., and Wolf, S.: Oblivious transfers and privacy amplification. In: Journal of Cryptology, vol. 16, no. 4 (2003) 219-237.
    • (2003) Journal of Cryptology , vol.16 , Issue.4 , pp. 219-237
    • Brassard, G.1    Crépeau, C.2    Wolf, S.3
  • 6
    • 85030121757 scopus 로고
    • Equivalence between two flavours of oblivious transfer
    • Advances in Cryptology-CRYPTO '87. Springer-Verlag
    • Crépeau, C.: Equivalence between two flavours of oblivious transfer. In: Advances in Cryptology-CRYPTO '87. Lecture Notes in Computer Science, Vol. 293. Springer-Verlag (1988) 350-354.
    • (1988) Lecture Notes in Computer Science , vol.293 , pp. 350-354
    • Crépeau, C.1
  • 8
    • 84957356475 scopus 로고    scopus 로고
    • Efficient cryptographic primitives based on noisy channels
    • Advances in Cryptology-EUROCRYPT '97. Springer-Verlag
    • Crépeau, C.: Efficient cryptographic primitives based on noisy channels. In: Advances in Cryptology-EUROCRYPT '97. Lecture Notes in Computer Science, Vol. 1233. Springer-Verlag (1997) 306-317.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 306-317
    • Crépeau, C.1
  • 10
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • Csiszár, I., and Körner, J.: Broadcast channels with confidential messages. In: IEEE Trans. on Information Theory, Vol. 24 (1978) 339-348.
    • (1978) IEEE Trans. on Information Theory , vol.24 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 11
    • 84957697395 scopus 로고    scopus 로고
    • On the (im)possibility of basing bit commitment and oblivious transfer on weakened security assumptions
    • Advances in Cryptology-EUROCRYPT '99. Springer-Verlag
    • Damgård, I., Kilian, J., Salvail, L.: On the (im)possibility of basing bit commitment and oblivious transfer on weakened security assumptions. In: Advances in Cryptology-EUROCRYPT '99. LNCS, vol. 1592. Springer-Verlag (1999) 56-73.
    • (1999) LNCS , vol.1592 , pp. 56-73
    • Damgård, I.1    Kilian, J.2    Salvail, L.3
  • 12
    • 0036040061 scopus 로고    scopus 로고
    • Tight security proofs for the bounded-storage model
    • Dziembowski, S. and Maurer, U. M.: Tight security proofs for the bounded-storage model. In: Proceedings of STOC 2002 (2002) 341-350.
    • (2002) Proceedings of STOC 2002 , pp. 341-350
    • Dziembowski, S.1    Maurer, U.M.2
  • 13
    • 0020878801 scopus 로고
    • A randomized protocol for signing contracts
    • Plenum Press
    • Even, S., Goldreich, O., and Lempel, A.: A randomized protocol for signing contracts. In: Proceedings of CRYPTO '82. Plenum Press (1983) 205-210.
    • (1983) Proceedings of CRYPTO '82 , pp. 205-210
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 15
    • 84955566100 scopus 로고    scopus 로고
    • Generalized oblivious transfer protocols based on noisy channels
    • Proc. Workshop MMM ACNS 2001. Springer-Verlag
    • Korjik, V., Morozov, K.: Generalized oblivious transfer protocols based on noisy channels. In: Proc. Workshop MMM ACNS 2001. LNCS, vol. 2052. Springer-Verlag (2001) 219-229.
    • (2001) LNCS , vol.2052 , pp. 219-229
    • Korjik, V.1    Morozov, K.2
  • 17
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • Maurer, U. M., Conditionally-perfect secrecy and a provably-secure randomized cipher. In: Journal of Cryptology, Vol. 5, No. 1 (1992) 53-66.
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.M.1
  • 18
    • 84957050617 scopus 로고    scopus 로고
    • Information-theoretic cryptography
    • Advances in Cryptology - CRYPTO '99, Springer-Verlag
    • Maurer, U. M.: Information-theoretic cryptography. In: Advances in Cryptology - CRYPTO '99, LNCS, Vol. 1666. Springer-Verlag. (1999) 47-64.
    • (1999) LNCS , vol.1666 , pp. 47-64
    • Maurer, U.M.1
  • 19
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Aiken Computation Laboratory, Harvard University
    • Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Memo TR-81, Aiken Computation Laboratory, Harvard University (1981).
    • (1981) Technical Memo , vol.TR-81
    • Rabin, M.O.1
  • 20
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C. E.: Communication theory of secrecy systems. In: Bell System Technical Journal, Vol. 28 (1949) 656-715.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 22
    • 23944463739 scopus 로고    scopus 로고
    • Commitment capacity of discrete memoryless channels
    • Cryptography and Coding. Springer-Verlag
    • Winter, A., Nascimento, A.C.A., Imai, H.: Commitment capacity of discrete memoryless channels. In: Cryptography and Coding. LNCS, vol. 2898. Springer-Verlag (2003) 35-51.
    • (2003) LNCS , vol.2898 , pp. 35-51
    • Winter, A.1    Nascimento, A.C.A.2    Imai, H.3
  • 24
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Wyner, A. D.: The wire-tap channel. In: Bell System Technical Journal, Vol. 54, No. 8 (1975) 1355-1387.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.