• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,929
Next 10 →

Efficient Oblivious Transfer Schemes

by Wen-guey Tzeng - In Proceedings of 2002 International Workshop on Practice and Theory in Public-Key Cryptography (PKC 02), Lecture Notes in Computer Science 2274 , 2001
"... In this paper we propose a very e#cient (string) OT 1 n scheme for any n # 2. We build our OT 1 n scheme from fundamental cryptographic techniques directly. It achieves optimal e#ciency in the number of rounds and the total number of exchanged messages for the case that the receiver 's c ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
is at least as strong as the hardness of the decisional Di#e-Hellman problem. We extend our OT 1 n scheme to distributed oblivious transfer schemes. Our distributed OT 1 n scheme takes full advantage of the research results of secret sharing and is conceptually simple. It achieves better security than

An Oblivious Transfer Scheme in Gaussian Arithmetic

by Kenneth K. Nwabueze
"... Most oblivious transfer schemes blend the capabilities of modern high-speed computers with Gaussian arithmetic. In this expository note, the basic mathematics used in a scheme that converts a remote call for “heads ” or “tails ” into the problem of factoring a large number is discussed. ..."
Abstract - Add to MetaCart
Most oblivious transfer schemes blend the capabilities of modern high-speed computers with Gaussian arithmetic. In this expository note, the basic mathematics used in a scheme that converts a remote call for “heads ” or “tails ” into the problem of factoring a large number is discussed.

Efficient k-out-ofn oblivious transfer schemes,”

by Cheng-Kang Chu , Wen-Guey Tzeng - Journal of Universal Computer Science, , 2008
"... Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme allows a buyer to privately choose k out of n digital goods from a merchant without learning information about other n−k ..."
Abstract - Cited by 23 (0 self) - Add to MetaCart
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme allows a buyer to privately choose k out of n digital goods from a merchant without learning information about other n

Optimal Transfer Schemes for Switching Controllers

by Jonathan Paxman, Glenn Vinnicombe
"... In this paper, we develop two general schemes for reducing the performance degradation caused by a signal substitution at the plant input. Such substitutions arise in modern control systems where we may transfer from manual to automatic, or between alternative controllers as operating points or perf ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
In this paper, we develop two general schemes for reducing the performance degradation caused by a signal substitution at the plant input. Such substitutions arise in modern control systems where we may transfer from manual to automatic, or between alternative controllers as operating points

Twin Pillars of Direct Benefit Transfer Scheme in India

by Deepika Jindal
"... The Government of India has launched various schemes for rural development and welfare in areas of employment, education, health, housing such as MNREGA, RSBY, PMGSY, SLBC, SSP to name a few. Also, Indian Government along with Reserve Bank of India is paving way towards Financial Inclusion- bringing ..."
Abstract - Add to MetaCart
- bringing banking services to lower level of pyramid. These two efforts are being integrated with the Direct Benefit Transfer Scheme or commonly refer as DBT scheme which was launched on 1 st Jan 2013. The Direct Benefit Transfer scheme was launched to curb the rampant leakages, corruption and frauds

Enhancement of Non-Interactive Oblivious Transfer Scheme

by Hui-feng Huang, Chin-chen Chang, Jieh-shan Yeh, Chin-chen Chang, Hui-feng Huang, Chin-chen Chang, Jieh-shan Yeh
"... In a t-out-n oblivious transfer, the receiver can only receive t messages out of n messages sent by the sender; and the sender has no idea about which ones have been received. Recently, Mu et al. proposed a non-interactive oblivious transfer scheme that can reduce many communication loads. However, ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
In a t-out-n oblivious transfer, the receiver can only receive t messages out of n messages sent by the sender; and the sender has no idea about which ones have been received. Recently, Mu et al. proposed a non-interactive oblivious transfer scheme that can reduce many communication loads. However

Efficient 1-out-n oblivious transfer schemes

by Wen-guey Tzeng - In Proc. of PKC 2002, LNCS 2274 , 2002
"... Abstract. In this paper we propose an efficient (string) OT 1 n scheme for any n ≥ 2. We build our OT 1 n scheme from fundamental cryptographic techniques directly. It achieves optimal efficiency in terms of the number of rounds and the total number of exchanged messages for the case that the receiv ..."
Abstract - Cited by 10 (1 self) - Add to MetaCart
on hardness of the decisional Diffie-Hellman problem. We extend our OT 1 n scheme to distributed oblivious transfer schemes. Our distributed OT 1 n scheme takes full advantage of the research results of secret sharing and is conceptually simple. It achieves better security than Naor and Pinkas’s scheme does

A Convergent Transfer Scheme To The Core Of A TU-Game

by J.C. Cesco, Revista De, Core Of, A Tu-game , 1998
"... We present an algorithm for computing points in the core of a game with transferable utility. We prove that it converges if and only if the core of the game is nonempty. The algorithm resembles the transfer scheme model introduced in Stearns [13]. AMS Classifications: D90. Key Words: TU-game, c ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
We present an algorithm for computing points in the core of a game with transferable utility. We prove that it converges if and only if the core of the game is nonempty. The algorithm resembles the transfer scheme model introduced in Stearns [13]. AMS Classifications: D90. Key Words: TU

Improvement of One Adaptive Oblivious Transfer Scheme

by Zhengjun Cao, Lihua Liu
"... In 2011, the authors [8] presented an adaptive oblivious transfer (OT) scheme based on Decisional 3-Party Diffie-Hellman (3DDH) assumption. The encryption used in the scheme is a combination of the Boneh-Boyen IBE scheme and a variation of the Hohenberger-Waters signature. The scheme is somewhat ine ..."
Abstract - Add to MetaCart
In 2011, the authors [8] presented an adaptive oblivious transfer (OT) scheme based on Decisional 3-Party Diffie-Hellman (3DDH) assumption. The encryption used in the scheme is a combination of the Boneh-Boyen IBE scheme and a variation of the Hohenberger-Waters signature. The scheme is somewhat

Improvement of Camenisch-Neven-Shelat oblivious transfer scheme,”

by Zhengjun Cao , Hanyue Cao - International Journal of Network Security, , 2015
"... Abstract In 2007, Camenisch, Neven and Shelat proposed an adaptive oblivious transfer (OT) scheme in which a sender has n messages, of which a receiver can adaptively choose to receive k one-after-the-other. In this paper, we show that the scheme has a drawback that the sender can serve a single re ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract In 2007, Camenisch, Neven and Shelat proposed an adaptive oblivious transfer (OT) scheme in which a sender has n messages, of which a receiver can adaptively choose to receive k one-after-the-other. In this paper, we show that the scheme has a drawback that the sender can serve a single
Next 10 →
Results 1 - 10 of 5,929
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University