Keyword : oblivious transfer


Efficient Fully Simulatable Oblivious Transfer from the McEliece Assumptions
Bernardo MACHADO DAVID Anderson C.A. NASCIMENTO Rafael T. DE SOUSA, JR. 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/11/01
Vol. E95-A  No. 11 ; pp. 2059-2066
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
oblivious transferMcEliece assumptionsprovable securitypost quantum cryptographycryptography
 Summary | Full Text:PDF(338.7KB)

Oblivious Transfer Based on the McEliece Assumptions
Rafael DOWSLEY Jeroen van de GRAAF Jorn MULLER-QUADE Anderson C. A. NASCIMENTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/02/01
Vol. E95-A  No. 2 ; pp. 567-575
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
oblivious transferMcEliece cryptosystempost-quantum security
 Summary | Full Text:PDF(384.1KB)

Unconditionally Secure Oblivious Transfer from Algebraic Signaling over the Gaussian Channel
Motohiko ISAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11 ; pp. 2017-2025
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
oblivious transferinformation theoretic securityAWGN channelgeometrically uniform partition
 Summary | Full Text:PDF(263KB)

Oblivious Transfer from the Additive White Gaussian Noise Channel
Motohiko ISAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/02/01
Vol. E93-A  No. 2 ; pp. 516-525
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
oblivious transferadditive white Gaussian noise channelinformation theoretic securityoblivious transfer rate
 Summary | Full Text:PDF(599.8KB)

Symmetricity of the Protocols Related to Oblivious Transfer
Daisuke INOUE Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1 ; pp. 217-221
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
oblivious transferstrong conditional oblivious transfersymmetricity
 Summary | Full Text:PDF(123.4KB)

Conditional Converge Cast
Daisuke INOUE Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/06/01
Vol. E91-A  No. 6 ; pp. 1537-1540
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
oblivious transferoblivious castconverge cast
 Summary | Full Text:PDF(84.7KB)

Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer
Urara SHINMYO Minoru KURIBAYASHI Masakatu MORII Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A  No. 10 ; pp. 2597-2602
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
fingerprintingdistributed providersoblivious transfer
 Summary | Full Text:PDF(304.2KB)

Verifiable Oblivious Transfer Protocol
Narn-Yih LEE Chien-Chih WANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/12/01
Vol. E88-D  No. 12 ; pp. 2890-2892
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
oblivious transferverificationzero knowledgecryptographysame message attack
 Summary | Full Text:PDF(72.4KB)

An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt
Shoichi HIROSE Susumu YOSHIDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 280-281
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
oblivious transferapproximation
 Summary | Full Text:PDF(114.9KB)

How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer
Kaoru KUROSAWA Quang Viet DUONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 141-146
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocol
Keyword: 
oblivious transferDiffie-Hellman assumption
 Summary | Full Text:PDF(223.3KB)

Matching Oblivious Transfer: How to Exchange Valuable Data
Shin'ichiro MATSUO Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 189-193
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
oblivious transfermultiparty protocolelectronic market and matching
 Summary | Full Text:PDF(145KB)