-
1
-
-
77950686974
-
On oblivious transfer capacity
-
December 10
-
Ahlswede, R., Csiszar, I.: On oblivious transfer capacity. In: IEEE Information Theory Workshop on Networking and Information Theory, ITW 2009, December 10, pp. 1-3 (2009)
-
(2009)
IEEE Information Theory Workshop on Networking and Information Theory, ITW 2009
, pp. 1-3
-
-
Ahlswede, R.1
Csiszar, I.2
-
3
-
-
84928743703
-
Precomputing oblivious transfer
-
Coppersmith, D. (ed.) LNCS Springer, Heidelberg
-
Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
-
(1995)
CRYPTO 1995
, vol.963
, pp. 97-109
-
-
Beaver, D.1
-
4
-
-
35048856983
-
A quantitative approach to reductions in secure computation
-
Naor, M. (ed.) LNCS Springer, Heidelberg
-
Beimel, A., Malkin, T.: A quantitative approach to reductions in secure computation. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 238-257. Springer, Heidelberg (2004)
-
(2004)
TCC 2004
, vol.2951
, pp. 238-257
-
-
Beimel, A.1
Malkin, T.2
-
5
-
-
0023985539
-
Privacy amplification by public discussion
-
Bennett, C.H., Brassard, G., Robert, J.M.: Privacy amplification by public discussion. SIAM Journal on Computing 17(2), 210-229 (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.M.3
-
6
-
-
84969361843
-
Practical quantum oblivious transfer
-
Feigenbaum, J. (ed.) LNCS Springer, Heidelberg
-
Bennett, C.H., Brassard, G., Crépeau, C., Skubiszewska, M.H.: Practical quantum oblivious transfer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 351-366. Springer, Heidelberg (1992)
-
(1992)
CRYPTO 1991
, vol.576
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, M.H.4
-
7
-
-
0022864717
-
Information theoretic reductions among disclosure problems
-
Brassard, G., Crépeau, C., Robert, J.M.: Information theoretic reductions among disclosure problems. In: Proceedings of the 27th Annual IEEE Symposium on Foundations of Computer Science (FOCS 1986), pp. 168-173 (1986)
-
(1986)
Proceedings of the 27th Annual IEEE Symposium on Foundations of Computer Science (FOCS 1986)
, pp. 168-173
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.M.3
-
8
-
-
21144437147
-
Oblivious transfers and privacy amplification
-
Brassard, G., Crépeau, C., Wolf, S.: Oblivious transfers and privacy amplification. Journal of Cryptology 16(4), 219-237 (2003)
-
(2003)
Journal of Cryptology
, vol.16
, Issue.4
, pp. 219-237
-
-
Brassard, G.1
Crépeau, C.2
Wolf, S.3
-
9
-
-
0030283655
-
Oblivious transfers and intersecting codes
-
Brassard, G., Crépeau, C., Santha, M.: Oblivious transfers and intersecting codes. IEEE Transactions on Information Theory 42(6), 1769-1780 (1996)
-
(1996)
IEEE Transactions on Information Theory
, vol.42
, Issue.6
, pp. 1769-1780
-
-
Brassard, G.1
Crépeau, C.2
Santha, M.3
-
10
-
-
84957712978
-
On the foundations of oblivious transfer
-
Nyberg, K. (ed.) LNCS Springer, Heidelberg
-
Cachin, C.: On the foundations of oblivious transfer. In: Nyberg, K. (ed.) EURO-CRYPT 1998. LNCS, vol. 1403, pp. 361-374. Springer, Heidelberg (1998)
-
(1998)
EURO-CRYPT 1998
, vol.1403
, pp. 361-374
-
-
Cachin, C.1
-
11
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS 2001, pp. 136-145 (2001)
-
(2001)
FOCS 2001
, pp. 136-145
-
-
Canetti, R.1
-
13
-
-
85030121757
-
Equivalence between two flavours of oblivious transfers
-
Pomerance, C. (ed.) LNCS Springer, Heidelberg
-
Crépeau, C.: Equivalence between two flavours of oblivious transfers. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 350-354. Springer, Heidelberg (1988)
-
(1988)
CRYPTO 1987
, vol.293
, pp. 350-354
-
-
Crépeau, C.1
-
14
-
-
23944515855
-
Efficient unconditional oblivious transfer from almost any noisy channel
-
Blundo, C., Cimato, S. (eds.) LNCS Springer, Heidelberg
-
Crépeau, C., Morozov, K., Wolf, S.: Efficient unconditional oblivious transfer from almost any noisy channel. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 47-59. Springer, Heidelberg (2005)
-
(2005)
SCN 2004
, vol.3352
, pp. 47-59
-
-
Crépeau, C.1
Morozov, K.2
Wolf, S.3
-
15
-
-
84969350571
-
On the reversibility of oblivious transfer
-
Davies, D.W. (ed.) LNCS Springer, Heidelberg
-
Crépeau, C., Santha, M.: On the reversibility of oblivious transfer. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 106-113. Springer, Heidelberg (1991)
-
(1991)
EUROCRYPT 1991
, vol.547
, pp. 106-113
-
-
Crépeau, C.1
Santha, M.2
-
16
-
-
33746042169
-
Optimal reductions between oblivious transfers using interactive hashing
-
Vaudenay, S. (ed.) LNCS Springer, Heidelberg
-
Crépeau, C., Savvides, G.: Optimal reductions between oblivious transfers using interactive hashing. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 201-221. Springer, Heidelberg (2006)
-
(2006)
EUROCRYPT 2006
, vol.4004
, pp. 201-221
-
-
Crépeau, C.1
Savvides, G.2
-
17
-
-
70350347114
-
Improving the security of quantum protocols via commit-and-open
-
Halevi, S. (ed.) LNCS Springer, Heidelberg
-
Damgård, I., Fehr, S., Lunemann, C., Salvail, L., Schaffner, C.: Improving the security of quantum protocols via commit-and-open. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 408-427. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009
, vol.5677
, pp. 408-427
-
-
Damgård, I.1
Fehr, S.2
Lunemann, C.3
Salvail, L.4
Schaffner, C.5
-
18
-
-
26444482584
-
Unfair noisy channels and oblivious transfer
-
Naor, M. (ed.) LNCS Springer, Heidelberg
-
Damgård, I., Fehr, S., Morozov, K., Salvail, L.: Unfair noisy channels and oblivious transfer. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 355-373. Springer, Heidelberg (2004)
-
(2004)
TCC 2004
, vol.2951
, pp. 355-373
-
-
Damgård, I.1
Fehr, S.2
Morozov, K.3
Salvail, L.4
-
19
-
-
33749565228
-
Oblivious transfer and linear functions
-
Dwork, C. (ed.) LNCS Springer, Heidelberg
-
Damgård, I., Fehr, S., Salvail, L., Schaffner, C.: Oblivious transfer and linear functions. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 427-444. Springer, Heidelberg (2006)
-
(2006)
CRYPTO 2006
, vol.4117
, pp. 427-444
-
-
Damgård, I.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
20
-
-
84957697395
-
On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
-
Stern, J. (ed.) LNCS Springer, Heidelberg
-
Damgård, I., Kilian, J., Salvail, L.: On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In: Stern, J. (ed.) EU-ROCRYPT 1999. LNCS, vol. 1592, pp. 56-73. Springer, Heidelberg (1999)
-
(1999)
EU-ROCRYPT 1999
, vol.1592
, pp. 56-73
-
-
Damgård, I.1
Kilian, J.2
Salvail, L.3
-
21
-
-
84957611040
-
Lower bounds for oblivious transfer reductions
-
Stern, J. (ed.) LNCS Springer, Heidelberg
-
Dodis, Y., Micali, S.: Lower bounds for oblivious transfer reductions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 42-55. Springer, Heidelberg (1999)
-
(1999)
EUROCRYPT 1999
, vol.1592
, pp. 42-55
-
-
Dodis, Y.1
Micali, S.2
-
22
-
-
77956985530
-
-
Cryptology ePrint Archive, Report 2008/457
-
Dowsley, R., van de Graaf, J., Müller-Quade, J., Nascimento, A.C.A.: On the composability of statistically secure bit commitments. Cryptology ePrint Archive, Report 2008/457 (2008)
-
(2008)
On the Composability of Statistically Secure Bit Commitments
-
-
Dowsley, R.1
Van De Graaf, J.2
Müller-Quade, J.3
Nascimento, A.C.A.4
-
23
-
-
0022080529
-
A randomized protocol for signing contracts
-
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
24
-
-
33645593031
-
Foundations of cryptography
-
Cambridge University Press, Cambridge
-
Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. II. Cambridge University Press, Cambridge (2004)
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
25
-
-
85032194875
-
How to solve any protocol problem - An efficiency improvement
-
Pomerance, C. (ed.) LNCS Springer, Heidelberg
-
Goldreich, O., Vainish, R.: How to solve any protocol problem - an efficiency improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 73-86. Springer, Heidelberg (1988)
-
(1988)
CRYPTO 1987
, vol.293
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
26
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Boneh, D. (ed.) LNCS Springer, Heidelberg
-
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
-
(2003)
CRYPTO 2003
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
28
-
-
45249091424
-
A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions
-
Kurosawa, K., Kishimoto, W., Koshiba, T.: A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions. IEEE Transactions on Information Theory 54(6), 2566-2571 (2008)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2566-2571
-
-
Kurosawa, K.1
Kishimoto, W.2
Koshiba, T.3
-
29
-
-
0001236013
-
Insecurity of quantum secure computations
-
Lo, H.K.: Insecurity of quantum secure computations. Physical Review A 56, 1154 (1997)
-
(1997)
Physical Review A
, vol.56
, pp. 1154
-
-
Lo, H.K.1
-
30
-
-
0001260566
-
Is quantum bit commitment really possible?
-
Lo, H.K., Chau, H.F.: Is quantum bit commitment really possible? Physical Review Letters 78, 3410-3413 (1997)
-
(1997)
Physical Review Letters
, vol.78
, pp. 3410-3413
-
-
Lo, H.K.1
Chau, H.F.2
-
31
-
-
84957050617
-
Information-theoretic cryptography
-
Wiener, M. (ed.) LNCS Springer, Heidelberg
-
Maurer, U.: Information-theoretic cryptography. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 47-64. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999
, vol.1666
, pp. 47-64
-
-
Maurer, U.1
-
32
-
-
0001336918
-
Unconditionally secure quantum bit commitment is impossible
-
Mayers, D.: Unconditionally secure quantum bit commitment is impossible. Physical Review Letters 78, 3414-3417 (1997)
-
(1997)
Physical Review Letters
, vol.78
, pp. 3414-3417
-
-
Mayers, D.1
-
34
-
-
51849126899
-
Cryptographic complexity of multi-party computation problems: Classifications and separations
-
Wagner, D. (ed.) LNCS Springer, Heidelberg
-
Prabhakaran, M., Rosulek, M.: Cryptographic complexity of multi-party computation problems: Classifications and separations. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 262-279. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008
, vol.5157
, pp. 262-279
-
-
Prabhakaran, M.1
Rosulek, M.2
-
36
-
-
72449167006
-
On the power of two-party quantum cryptography
-
Matsui, M. (ed.) LNCS Springer, Heidelberg
-
Salvail, L., Schaffner, C., Sotáková, M.: On the power of Two-party quantum cryptography. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 70-87. Springer, Heidelberg (2009)
-
(2009)
ASIACRYPT 2009
, vol.5912
, pp. 70-87
-
-
Salvail, L.1
Schaffner, C.2
Sotáková, M.3
-
38
-
-
77954644441
-
Universally composable quantum multi-party computation
-
Gilbert, H. (ed.) LNCS Springer, Heidelberg
-
Unruh, D.: Universally composable quantum multi-party computation. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 486-505. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010
, vol.6110
, pp. 486-505
-
-
Unruh, D.1
-
39
-
-
0001998264
-
Conjugate coding
-
Wiesner, S.: Conjugate coding. SIGACT News 15(1), 78-88 (1983)
-
(1983)
SIGACT News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
-
41
-
-
23944463739
-
Commitment capacity of discrete memoryless channels
-
Winter, A., Nascimento, A.C.A., Imai, H.: Commitment capacity of discrete memoryless channels. In: IMA Int. Conf., pp. 35-51 (2003)
-
(2003)
IMA Int. Conf.
, pp. 35-51
-
-
Winter, A.1
Nascimento, A.C.A.2
Imai, H.3
-
43
-
-
45249110618
-
New monotones and lower bounds in unconditional two-party computation
-
Wolf, S., Wullschleger, J.: New monotones and lower bounds in unconditional two-party computation. IEEE Transactions on Information Theory 54(6), 2792-2797 (2008)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2792-2797
-
-
Wolf, S.1
Wullschleger, J.2
-
44
-
-
33745181204
-
New monotones and lower bounds in unconditional two-party computation
-
Shoup, V. (ed.) LNCS Springer, Heidelberg
-
Wolf, S., Wullschleger, J.: New monotones and lower bounds in unconditional two-party computation. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 467-477. Springer, Heidelberg (2005)
-
(2005)
CRYPTO 2005
, vol.3621
, pp. 467-477
-
-
Wolf, S.1
Wullschleger, J.2
-
45
-
-
33746074792
-
Oblivious transfer is symmetric
-
Vaudenay, S. (ed.) LNCS Springer, Heidelberg
-
Wolf, S., Wullschleger, J.: Oblivious transfer is symmetric. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 222-232. Springer, Heidelberg (2006)
-
(2006)
EUROCRYPT 2006
, vol.4004
, pp. 222-232
-
-
Wolf, S.1
Wullschleger, J.2
-
46
-
-
38049160265
-
Oblivious-transfer amplification
-
Naor, M. (ed.) LNCS Springer, Heidelberg
-
Wullschleger, J.: Oblivious-transfer amplification. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 555-572. Springer, Heidelberg (2007)
-
(2007)
EUROCRYPT 2007
, vol.4515
, pp. 555-572
-
-
Wullschleger, J.1
-
47
-
-
70350627590
-
Oblivious transfer from weak noisy channels
-
Reingold, O. (ed.) LNCS Springer, Heidelberg
-
Wullschleger, J.: Oblivious transfer from weak noisy channels. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 332-349. Springer, Heidelberg (2009)
-
(2009)
TCC 2009
, vol.5444
, pp. 332-349
-
-
Wullschleger, J.1
|