Efficient oblivious transfers with access control
From MaRDI portal
(Redirected from Publication:453798)
Recommendations
Cites work
- scientific article; zbMATH DE number 1722673 (Why is no real title available?)
- scientific article; zbMATH DE number 1722674 (Why is no real title available?)
- scientific article; zbMATH DE number 1942413 (Why is no real title available?)
- scientific article; zbMATH DE number 1952906 (Why is no real title available?)
- scientific article; zbMATH DE number 1418318 (Why is no real title available?)
- scientific article; zbMATH DE number 1440890 (Why is no real title available?)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Computationally secure oblivious transfer
- Conditional Oblivious Transfer and Timed-Release Encryption
- Constant-Size Dynamic k-TAA
- Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
- Efficient dynamic \(k\)-times anonymous authentication
- Oblivious signature-based envelope
- Oblivious transfer and polynomial evaluation
- Oblivious transfer with hidden access control policies
- Privacy Preserving Keyword Searches on Remote Encrypted Data
- Public Key Cryptography - PKC 2005
- Public Key Cryptography - PKC 2006
- Security, privacy and trust in modern data management.
- Simple adaptive oblivious transfer without random oracle
- Simulatable Adaptive Oblivious Transfer
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- k-Times Anonymous Authentication (Extended Abstract)
Cited in
(13)- scientific article; zbMATH DE number 1952770 (Why is no real title available?)
- More efficient oblivious transfer extensions
- Communication-efficient distributed oblivious transfer
- Oblivious transfer and privacy amplification
- Revisiting Oblivious Signature-Based Envelopes
- Efficient Traceable Oblivious Transfer and Its Applications
- scientific article; zbMATH DE number 1941258 (Why is no real title available?)
- Theory of Cryptography
- Blind attribute-based encryption and oblivious transfer with fine-grained access control
- Issuer-free oblivious transfer with access control revisited
- Laconic oblivious transfer and its applications
- Threshold changeable secret sharing with secure secret reconstruction
- Adaptive oblivious transfer and generalization
This page was built for publication: Efficient oblivious transfers with access control
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q453798)