Adaptive Oblivious Transfer and Generalization
From MaRDI portal
Publication:2953778
DOI10.1007/978-3-662-53890-6_8zbMath1407.94089OpenAlexW2549646992MaRDI QIDQ2953778
Olivier Blazy, Céline Chevalier, Paul Germouty
Publication date: 6 January 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53890-6_8
private information retrievalUC frameworkadaptive oblivious transferoblivious signature-based envelope
Related Items (3)
UC priced oblivious transfer with purchase statistics and dynamic pricing ⋮ Adaptive Oblivious Transfer and Generalization ⋮ A gapless code-based hash proof system based on RQC and its applications
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Communication Optimal Tardos-Based Asymmetric Fingerprinting
- Generic Construction of UC-Secure Oblivious Transfer
- New Techniques for SPHFs and Efficient One-Round PAKE Protocols
- An Algebraic Framework for Diffie-Hellman Assumptions
- SPHF-Friendly Non-interactive Commitments
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions
- Efficient Structure-Preserving Signature Scheme from Standard Assumptions
- Adaptive Oblivious Transfer and Generalization
- Identity-Based Cryptosystems and Signature Schemes
- Round-Optimal Password-Based Authenticated Key Exchange
- Generic Fully Simulatable Adaptive Oblivious Transfer
- Oblivious Transfer with Hidden Access Control Policies
- Signatures on Randomizable Ciphertexts
- Smooth Projective Hashing for Conditionally Extractable Commitments
- Universally Composable Adaptive Priced Oblivious Transfer
- A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
- Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Universally composable two-party and multi-party secure computation
- Credential Authenticated Identification and Key Exchange
- A Framework for Efficient and Composable Oblivious Transfer
- Universally Composable Adaptive Oblivious Transfer
- Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
- A New Protocol for Conditional Disclosure of Secrets and Its Applications
- Universally-Composable Two-Party Computation in Two Rounds
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- New directions in cryptography
- Conditional Oblivious Transfer and Timed-Release Encryption
- A Pseudorandom Generator from any One-way Function
- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
- Partial Garbling Schemes and Their Applications
- Smooth Projective Hashing and Two-Message Oblivious Transfer
- Efficient Identity-Based Encryption Without Random Oracles
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More
- Simulatable Adaptive Oblivious Transfer
- A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
- Theory of Cryptography
- Dual System Encryption via Predicate Encodings
- Round-Optimal Composable Blind Signatures in the Common Reference String Model
- Oblivious signature-based envelope
This page was built for publication: Adaptive Oblivious Transfer and Generalization