메뉴 건너뛰기




Volumn 4515 LNCS, Issue , 2007, Pages 573-590

Simulatable adaptive oblivious transfer

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE ALGORITHMS; COMPUTER SIMULATION; MESSAGE PASSING; RANDOM PROCESSES; SECURITY OF DATA; SIGNAL RECEIVERS;

EID: 38049132285     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72540-4_33     Document Type: Conference Paper
Times cited : (169)

References (40)
  • 1
    • 84945134014 scopus 로고    scopus 로고
    • Priced oblivious transfer: How to sell digital goods
    • W. Aiello, Y. Ishai, and O. Reingold. : Priced oblivious transfer: How to sell digital goods. In EUROCRYPT 2001, p. 119-135.
    • EUROCRYPT 2001 , pp. 119-135
    • Aiello, W.1    Ishai, Y.2    Reingold, O.3
  • 2
    • 33745648522 scopus 로고    scopus 로고
    • On the (im)possibility of blind message authentication codes
    • M. Abdalla, C. Namprempre, and G. Neven. On the (im)possibility of blind message authentication codes. In CT-RSA 2006, p. 262-279.
    • (2006) CT-RSA , pp. 262-279
    • Abdalla, M.1    Namprempre, C.2    Neven, G.3
  • 3
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • D. Boneh and X. Boyen. Short signatures without random oracles. In EUROCRYPT 2004, p. 56-73.
    • EUROCRYPT 2004 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 5
    • 84983104598 scopus 로고    scopus 로고
    • On defining proofs of knowledge
    • M. Bellare and O. Goldreich. On defining proofs of knowledge. In CRYPTO'92, p. 390-420.
    • CRYPTO'92 , pp. 390-420
    • Bellare, M.1    Goldreich, O.2
  • 6
    • 85032877753 scopus 로고    scopus 로고
    • Non-interactive oblivious transfer and applications
    • M. Bellare and S. Micali. Non-interactive oblivious transfer and applications. In CRYPTO'89, p. 547-557.
    • CRYPTO'89 , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 7
    • 20544449100 scopus 로고    scopus 로고
    • The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
    • M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko. The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme. J. Cryptology, 16(3):185-215, 2003.
    • (2003) J. Cryptology , vol.16 , Issue.3 , pp. 185-215
    • Bellare, M.1    Namprempre, C.2    Pointcheval, D.3    Semanko, M.4
  • 8
    • 35248880074 scopus 로고    scopus 로고
    • Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme
    • A. Boldyreva. Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In PKC 2003, p. 31-46.
    • PKC 2003 , pp. 31-46
    • Boldyreva, A.1
  • 9
    • 0027726717 scopus 로고    scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS 93, p. 62-73.
    • ACM CCS , vol.93 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 10
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multi-party cryptographic protocols
    • R. Canetti. Security and composition of multi-party cryptographic protocols. J. Cryptology, 13(1):143-202, 2000.
    • (2000) J. Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 11
    • 84957802212 scopus 로고    scopus 로고
    • Efficient zero-knowledge proofs of knowledge without intractability assumptions
    • R. Cramer, I. Damgård, and P. MacKenzie. Efficient zero-knowledge proofs of knowledge without intractability assumptions. In PKC 2000, p. 354-372.
    • PKC 2000 , pp. 354-372
    • Cramer, R.1    Damgård, I.2    MacKenzie, P.3
  • 12
    • 38049128453 scopus 로고
    • Blind signature systems
    • U.S. Patent #4,759,063
    • D. Chaum. Blind signature systems. U.S. Patent #4,759,063, 1988.
    • (1988)
    • Chaum, D.1
  • 13
    • 85012928152 scopus 로고    scopus 로고
    • Weakening security assumptions and oblivious transfer
    • C. Crépeau and J. Kilian. Weakening security assumptions and oblivious transfer. In CRYPTO'88, p. 2-7.
    • CRYPTO'88 , pp. 2-7
    • Crépeau, C.1    Kilian, J.2
  • 14
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In CRYPTO 2004, p. 56-72.
    • CRYPTO 2004 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 16
    • 33846879363 scopus 로고    scopus 로고
    • Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication. To appear in J
    • D. Catalano, D. Pointcheval, and T. Pornin. Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication. To appear in J. Cryptology, 2007.
    • (2007) Cryptology
    • Catalano, D.1    Pointcheval, D.2    Pornin, T.3
  • 17
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In CRYPTO'97, p. 410-424.
    • CRYPTO'97 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 18
    • 24144485861 scopus 로고    scopus 로고
    • Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries
    • C.-K. Chu and W.-G. Tzeng. Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries. In PKC 2005, p. 172-183.
    • PKC 2005 , pp. 172-183
    • Chu, C.-K.1    Tzeng, W.-G.2
  • 19
    • 20444446289 scopus 로고    scopus 로고
    • Concurrent zero-knowledge
    • C. Dwork, M. Naor, and A. Sahai. Concurrent zero-knowledge. J. ACM, 51(6):851-898, 2004.
    • (2004) J. ACM , vol.51 , Issue.6 , pp. 851-898
    • Dwork, C.1    Naor, M.2    Sahai, A.3
  • 20
    • 24144481228 scopus 로고    scopus 로고
    • A verifiable random function with short proofs and keys
    • Y. Dodis and A. Yampolskiy. A verifiable random function with short proofs and keys. In PKC 2005, p. 416-431.
    • PKC 2005 , pp. 416-431
    • Dodis, Y.1    Yampolskiy, A.2
  • 21
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 22
    • 84874800178 scopus 로고
    • A public key cryptosystem and signature scheme based on discrete logarithms
    • T. ElGamal. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 24
    • 0023545076 scopus 로고    scopus 로고
    • How to play any mental game, or a completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game, or a completeness theorem for protocols with honest majority. In 19th ACM STOC, p. 218-229.
    • 19th ACM STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 25
    • 85008172715 scopus 로고    scopus 로고
    • Invariant signatures and non-interactive zero-knowledge proofs are equivalent
    • S. Goldwasser and R. Ostrovsky. Invariant signatures and non-interactive zero-knowledge proofs are equivalent. In CRYPTO'92, p. 228-245.
    • CRYPTO'92 , pp. 228-245
    • Goldwasser, S.1    Ostrovsky, R.2
  • 26
    • 84958591696 scopus 로고    scopus 로고
    • Security of blind digital signatures (Extended abstract)
    • A. Juels, M. Luby, and R. Ostrovsky. Security of blind digital signatures (Extended abstract). In CRYPTO'97, p. 150-164.
    • CRYPTO'97 , pp. 150-164
    • Juels, A.1    Luby, M.2    Ostrovsky, R.3
  • 27
    • 24944473997 scopus 로고    scopus 로고
    • Smooth projective hashing and two-message oblivious transfer
    • Y. Kalai. Smooth projective hashing and two-message oblivious transfer. In EUROCRYPT 2005, p. 78-95.
    • EUROCRYPT 2005 , pp. 78-95
    • Kalai, Y.1
  • 29
    • 38049109536 scopus 로고    scopus 로고
    • Oblivious transfer based on blind signatures
    • Technical Report 2003-31, Leibniz Center, Hebrew University
    • D. Malkhi and Y. Sella. Oblivious transfer based on blind signatures. Technical Report 2003-31, Leibniz Center, Hebrew University, 2003.
    • (2003)
    • Malkhi, D.1    Sella, Y.2
  • 31
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation. In 31st ACM STOC, p. 245-254, 1999.
    • (1999) 31st ACM STOC , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 32
    • 84957096920 scopus 로고    scopus 로고
    • Oblivious transfer with adaptive queries
    • M. Naor and B. Pinkas. Oblivious transfer with adaptive queries. In CRYPTO'99, p. 573-590.
    • CRYPTO'99 , pp. 573-590
    • Naor, M.1    Pinkas, B.2
  • 33
    • 64049119146 scopus 로고    scopus 로고
    • Efficient oblivious transfer protocols
    • M. Naor and B. Pinkas. Efficient oblivious transfer protocols. In 12th SODA, p. 448-457, 2001.
    • (2001) 12th SODA , pp. 448-457
    • Naor, M.1    Pinkas, B.2
  • 34
    • 22044454088 scopus 로고    scopus 로고
    • Computationally secure oblivious transfer
    • M. Naor and B. Pinkas. Computationally secure oblivious transfer. J. Cryptology, 18, 2005.
    • (2005) J. Cryptology , vol.18
    • Naor, M.1    Pinkas, B.2
  • 35
    • 1942420748 scopus 로고    scopus 로고
    • Oblivious keyword search
    • W. Ogata and K. Kurosawa. Oblivious keyword search. J. Complexity, 20(2-3):356-371, 2004.
    • (2004) J. Complexity , vol.20 , Issue.2-3 , pp. 356-371
    • Ogata, W.1    Kurosawa, K.2
  • 36
    • 33745554010 scopus 로고    scopus 로고
    • Efficient blind and partially blind signatures without random oracles
    • TCC 2006
    • T. Okamoto. Efficient blind and partially blind signatures without random oracles. In TCC 2006, LNCS, p. 80-99.
    • LNCS , pp. 80-99
    • Okamoto, T.1
  • 37
    • 0842310308 scopus 로고    scopus 로고
    • k out of n oblivious transfer without random oracles
    • W. Ogata and R. Sasahara. k out of n oblivious transfer without random oracles. IEICE Transactions, 87-A(1):147-151, 2004.
    • (2004) IEICE Transactions , vol.87-A , Issue.1 , pp. 147-151
    • Ogata, W.1    Sasahara, R.2
  • 38
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • D. Pointcheval and J. Stern. Security proofs for signature schemes. In EUROCRYPT'96, p. 387-398.
    • EUROCRYPT'96 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 39
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Technical Report TR-81, Harvard Aiken Computation Laboratory
    • M. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory, 1981.
    • (1981)
    • Rabin, M.1
  • 40
    • 0001998264 scopus 로고
    • Conjugate Coding
    • S. Wiesner. Conjugate Coding. SIGACT News, 15, 1983. . 78-88.
    • (1983) SIGACT News
    • Wiesner, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.