Efficient oblivious transfers with access control
From MaRDI portal
Publication:453798
DOI10.1016/J.CAMWA.2011.11.048zbMATH Open1247.94035OpenAlexW1966837220MaRDI QIDQ453798FDOQ453798
Authors: Jinguang Han, Willy Susilo, Yi Mu, Jun Yan
Publication date: 30 September 2012
Published in: Computers & Mathematics with Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.camwa.2011.11.048
Recommendations
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Network protocols (68M12)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Oblivious transfer and polynomial evaluation
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Title not available (Why is that?)
- Oblivious transfer with hidden access control policies
- Constant-Size Dynamic k-TAA
- Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Title not available (Why is that?)
- Simulatable Adaptive Oblivious Transfer
- Computationally secure oblivious transfer
- Efficient dynamic \(k\)-times anonymous authentication
- Privacy Preserving Keyword Searches on Remote Encrypted Data
- Simple adaptive oblivious transfer without random oracle
- Conditional Oblivious Transfer and Timed-Release Encryption
- Title not available (Why is that?)
- k-Times Anonymous Authentication (Extended Abstract)
- Public Key Cryptography - PKC 2005
- Oblivious signature-based envelope
- Public Key Cryptography - PKC 2006
- Security, privacy and trust in modern data management.
Cited In (13)
- Theory of Cryptography
- Oblivious transfer and privacy amplification
- Efficient Traceable Oblivious Transfer and Its Applications
- Communication-efficient distributed oblivious transfer
- Blind attribute-based encryption and oblivious transfer with fine-grained access control
- Issuer-free oblivious transfer with access control revisited
- Title not available (Why is that?)
- Revisiting Oblivious Signature-Based Envelopes
- Title not available (Why is that?)
- More efficient oblivious transfer extensions
- Laconic oblivious transfer and its applications
- Threshold changeable secret sharing with secure secret reconstruction
- Adaptive oblivious transfer and generalization
This page was built for publication: Efficient oblivious transfers with access control
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q453798)