User menu

Building Oblivious Transfer on Channel Delays

Bibliographic reference Palmieri, Paolo ; Pereira, Olivier. Building Oblivious Transfer on Channel Delays.Inscrypt 2010 (Shanghai, China, du 20/10/2010 au 24/10/2010). In: Information Security and Cryptology - 6th International Conference, 2011, p. 125-138
Permanent URL
  1. Bellardo, J., Savage, S.: Measuring packet reordering. In: Internet Measurement Workshop, pp. 97–105. ACM, New York (2002)
  2. Chaum David, Damgård Ivan B., van de Graaf Jeroen, Multiparty Computations Ensuring Privacy of Each Party’s Input and Correctness of the Result, Advances in Cryptology — CRYPTO ’87 (1988) ISBN:9783540187967 p.87-119, 10.1007/3-540-48184-2_7
  3. Crépeau Claude, Equivalence Between Two Flavours of Oblivious Transfers, Advances in Cryptology — CRYPTO ’87 (1988) ISBN:9783540187967 p.350-354, 10.1007/3-540-48184-2_30
  4. Crépeau Claude, Efficient Cryptographic Protocols Based on Noisy Channels, Advances in Cryptology — EUROCRYPT ’97 (1997) ISBN:9783540629757 p.306-317, 10.1007/3-540-69053-0_21
  5. Crépeau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions (extended abstract). In: FOCS, pp. 42–52. IEEE, Los Alamitos (1988)
  6. Crépeau Claude, Morozov Kirill, Wolf Stefan, Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel, Security in Communication Networks (2005) ISBN:9783540243014 p.47-59, 10.1007/978-3-540-30598-9_4
  7. Damgård Ivan, Fehr Serge, Morozov Kirill, Salvail Louis, Unfair Noisy Channels and Oblivious Transfer, Theory of Cryptography (2004) ISBN:9783540210009 p.355-373, 10.1007/978-3-540-24638-1_20
  8. Damgård Ivan, Kilian Joe, Salvail Louis, On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions, Advances in Cryptology — EUROCRYPT ’99 (1999) ISBN:9783540658894 p.56-73, 10.1007/3-540-48910-x_5
  9. Even Shimon, Goldreich Oded, Lempel Abraham, A randomized protocol for signing contracts, 10.1145/3812.3818
  10. Kilian, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20–31. ACM, New York (1988)
  11. Nascimento Anderson C. A., Winter Andreas, On the Oblivious-Transfer Capacity of Noisy Resources, 10.1109/tit.2008.921856
  12. Piratla Nischal, Jayasumana Anura, Reordering of Packets due to Multipath Forwarding - An Analysis, 10.1109/icc.2006.254810
  13. Pomerance, C. (ed.): CRYPTO 1987. LNCS, vol. 293. Springer, Heidelberg (1988)
  14. Proakis, J.G.: Digital Communications, 4th edn. McGraw-Hill Science Engineering, New York (2000)
  15. Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University (1981), manuscript
  16. Wullschleger Jürg, Oblivious-Transfer Amplification, Advances in Cryptology - EUROCRYPT 2007 (2007) ISBN:9783540725398 p.555-572, 10.1007/978-3-540-72540-4_32
  17. Wullschleger Jürg, Oblivious Transfer from Weak Noisy Channels, Theory of Cryptography (2009) ISBN:9783642004568 p.332-349, 10.1007/978-3-642-00457-5_20
  18. Zhou Xiaoming, Van Mieghem Piet, Reordering of IP Packets in Internet, Lecture Notes in Computer Science (2004) ISBN:9783540214922 p.237-246, 10.1007/978-3-540-24668-8_24