User menu

Secure Two-Party Computation Over a Z-Channel

Bibliographic reference Palmieri, Paolo ; Pereira, Olivier. Secure Two-Party Computation Over a Z-Channel.Provable Security - 5th International Conference, ProvSec 2011 (Xi'an, China, du 16/10/2011 au 18/10/2011). In: Xavier Boyen, Provable Security - 5th International Conference, ProvSec 2011, 2011, p. 3-15
Permanent URL
  1. Baumert, L.D., McEliece, R.J., Rumsey, H.: Coding for optical channels. In: JPL Deep Space Network Progress Report, vol. 42-49, pp. 70–77 (1978)
  2. Crépeau Claude, Equivalence Between Two Flavours of Oblivious Transfers, Advances in Cryptology — CRYPTO ’87 (1988) ISBN:9783540187967 p.350-354, 10.1007/3-540-48184-2_30
  3. Crépeau Claude, Efficient Cryptographic Protocols Based on Noisy Channels, Advances in Cryptology — EUROCRYPT ’97 (1997) ISBN:9783540629757 p.306-317, 10.1007/3-540-69053-0_21
  4. Crépeau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions (extended abstract). In: FOCS, pp. 42–52. IEEE, Los Alamitos (1988)
  5. Crépeau Claude, Morozov Kirill, Wolf Stefan, Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel, Security in Communication Networks (2005) ISBN:9783540243014 p.47-59, 10.1007/978-3-540-30598-9_4
  6. Damgård Ivan, Fehr Serge, Morozov Kirill, Salvail Louis, Unfair Noisy Channels and Oblivious Transfer, Theory of Cryptography (2004) ISBN:9783540210009 p.355-373, 10.1007/978-3-540-24638-1_20
  7. Damgård Ivan, Kilian Joe, Salvail Louis, On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions, Advances in Cryptology — EUROCRYPT ’99 (1999) ISBN:9783540658894 p.56-73, 10.1007/3-540-48910-x_5
  8. Golomb S., The limiting behavior of the Z-channel (Corresp.), 10.1109/tit.1980.1056175
  9. Imai Hideki, Morozov Kirill, A. Nascimento Anderson, On the Oblivious Transfer Capacity of the Erasure Channel, 10.1109/isit.2006.262082
  10. Kilian, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20–31. ACM, New York (1988)
  11. Moskowitz I.S., Greenwald S.J., Kang M.H., An analysis of the timed Z-channel, 10.1109/18.737549
  12. Nascimento Anderson C. A., Winter Andreas, On the Oblivious-Transfer Capacity of Noisy Resources, 10.1109/tit.2008.921856
  13. Palmieri Paolo, Pereira Olivier, Building Oblivious Transfer on Channel Delays, Information Security and Cryptology (2011) ISBN:9783642215179 p.125-138, 10.1007/978-3-642-21518-6_10
  14. Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University (1981) (manuscript)
  15. Wullschleger Jürg, Oblivious-Transfer Amplification, Advances in Cryptology - EUROCRYPT 2007 (2007) ISBN:9783540725398 p.555-572, 10.1007/978-3-540-72540-4_32
  16. Wullschleger Jürg, Oblivious Transfer from Weak Noisy Channels, Theory of Cryptography (2009) ISBN:9783642004568 p.332-349, 10.1007/978-3-642-00457-5_20