Skip to main content
In this paper we address the issue of privacy preserving data mining. Specifically, we consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without... more
    • by 
    •   15  
      Information SystemsData MiningSoft ComputingPure Mathematics
Digital Rights Management (DRM) is required to provide balanced protection for both the content provider and the users in a content distribution system. The content provider demands secure content delivery so that only authorized users... more
    • by 
    •   6  
      BusinessComputer ScienceNetwork SecurityCryptography
We consider the problem of designing an efficient oblivious transfer (OT) protocol that is provably secure in a concurrent setting, i.e., where many OT sessions may be running concurrently with their messages interleaved arbitrarily.... more
    • by 
    •   14  
      Computer ScienceCryptographyAuthenticationProtocols
    • by 
    •   5  
      Standard ModelPublic key cryptographyOblivious TransferPrivacy Preservation
First and foremost, I would like to thank Markulf Kohlweiss, who has been a great supervisor for me. I am grateful to him for all the work he has done for this thesis, for the interest he has always shown, for his patience when answering... more
    • by 
    •   13  
      MathematicsComputer ScienceCryptographyGraphics
In the Probabilistic I/O Automata (PIOA) framework, nondeterministic choices are resolved using perfect-information schedulers, which are similar to history-dependent policies for Markov decision processes (MDPs). These schedulers are too... more
    • by 
    •   14  
      Distributed ComputingDistributed AlgorithmsMarkov ProcessesMarkov Decision Process
Randomized protocols for signing contracts, certified mail, and flipping a coin are presented. The protocols use a Z-out-of-2 oblivious transfer subprotocol which is axiomatically defined.
    • by 
    •   4  
      CryptoCryptologyOblivious TransferPublic Key Cryptosystem
We present protocols for two flavors of oblivious transfer (OT): the Rabin and 1-out-of-2 OT based on the assumptions related to security of the McEliece cryptosystem and two zero-knowledge identification (ZKID) schemes, Stern's from... more
    • by 
    •   3  
      Coding TheoryZero-Knowledge ProofsOblivious Transfer
In today's heterogeneous network environment, there is a growing demand for distrusted parties to jointly execute distributed algorithms on private data whose secrecy needed to be safeguarded. Protocols that support such kind of joint... more
    • by 
    •   11  
      Image ProcessingDistributed AlgorithmsImage FilteringSecure Multiparty Computation
ABSTRACT In this paper, we provide the first scheme that realises an attribute-based access control system for static resources that offers maximal privacy and is secure in the universal composability framework (UC). More precisely, we... more
    • by 
    •   5  
      PrivacyStandard ModelSecure Multiparty ComputationOblivious Transfer
Advances in modern cryptography coupled with rapid growth in processing and communication speeds make secure two-party computation a realis- tic paradigm. Yet, thus far, interest in this paradigm has remained mostly theoretical. This... more
    • by 
    •   3  
      Oblivious TransferTest BedSecure Two-party Computation
We consider the problem of sending messages \into the future." Previous constructions for this task were either based on heuristic assumptions or did not provide anonymity to the sender of the message. In the public-key setting, we... more
    • by 
    • Oblivious Transfer
Recent results of Ajtai on the hardness of lattice problems have inspired several cryptographic protocols. At Crypto ’97, Goldreich, Goldwasser and Halevi proposed a public-key cryptosystem based on the closest vector problem in a... more
    • by 
    •   24  
      Information TheoryComputer SecurityCryptographyLinear Algebra
We show how to implement cryptographic primitives based on the realistic assumption that quantum storage of qubits is noisy. We thereby consider individual-storage attacks, i.e. the dishonest party attempts to store each incoming qubit... more
    • by 
    •   3  
      Quantum CryptographyPhysical sciencesOblivious Transfer
It was shown in [WST08] that cryptographic primitives can be implemented based on the assumption that quantum storage of qubits is noisy. In this work we analyze a protocol for the universal task of oblivious transfer that can be... more
    • by 
    •   4  
      Quantum PhysicsQuantum InformationQuantum Key DistributionOblivious Transfer
The main cryptographic primitives (Bit Commitment (BC) and Oblivious Transfer (OT) protocols) based on noisy channels have been considered in [1] for asymptotic case. Non-asymptotic behavior of BC protocol has been demonstrated in [2].... more
    • by 
    •   8  
      Computer ScienceCryptographyCodingInformation theoretic security
    • by  and +1
    • Oblivious Transfer
In secure two-party function evaluation Alice holding initially a secret input x and Bob having a secret input y communicate to determine a prescribed function f (x, y) in such a way that after the computation Bob learns f (x, y) but... more
    • by  and +1
    •   3  
      Quantum ComputerOblivious TransferSecure Function Evaluation
    • by 
    •   4  
      Computer ScienceInformation theoretic securityOblivious TransferSecurity Protocol
The authors present some general techniques for establishing the cryptographic strength of a wide variety of games. As case studies, they analyze some weakened versions of the standard forms of oblivious transfer. They also consider... more
    • by 
    •   13  
      MathematicsCoding TheoryComputer SciencePhysics
The basic idea of our protocol is establishing a conference key based on oblivious transfer which can be used in either asymmetric or symmetric cryptography, such that we can reduce the number of decryptions for the key confirmation... more
    • by 
    • Oblivious Transfer
Designing efficient cryptographic protocols tolerating adaptive adversaries, who are able to corrupt parties on the fly as the computation proceeds, has been an elusive task. Indeed, thus far no efficient protocols achieve adaptive... more
    • by 
    •   5  
      Oblivious TransferSecure CommunicationInput OutputSecurity Protocol
In this paper we present an eficient protocol for "Committed Oblivious Transfer" to perform oblivious transfer on committed bits: suppose Alice is committed to bits 00 and a1 and Bob is committed to b, they both want Bob to learn and... more
    • by 
    •   3  
      Oblivious TransferMulti Party ComputationError Correction Code
Digital Rights Management (DRM) is required to provide balanced protection for both the content provider and the users in a content distribution system. The content provider demands secure content delivery so that only authorized users... more
    • by 
    •   4  
      Network SecurityCryptographyDigital Rights Management (DRM)Oblivious Transfer
Deniable encryption is an important that allows a user (a sender and/or a receiver) to escape a coercion attempted by a coercive adversary. Such an adversary approaches the coerced user after transmission forcing him to reveal all his... more
    • by 
    •   4  
      Computer ScienceOblivious TransferRSAPublic Key Encryption
We use interactive hashing to achieve the most ecient OT protocol to date based solely on the assumption that trapdoor permutations (TDP) exist. Our protocol can be seen as the following (simple) modication of either of the two famous OT... more
    • by 
    •   4  
      Computer ScienceInformation theoretic securityOblivious TransferPublic Key
Abstract. We present two efficient protocols for two flavors of oblivious transfer (OT): the Rabin and 1-out-of-2 OT using the McEliece cryptosystem and Shamir’s zero-knowledge identification scheme based on permuted kernels. This is a... more
    • by 
    •   3  
      MathematicsComputer ScienceOblivious Transfer
We present protocols for two flavors of oblivious transfer (OT): the Rabin and 1-out-of-2 OT based on the assumptions related to security of the McEliece cryptosystem and two zero-knowledge identification (ZKID) schemes, Stern's from... more
    • by 
    •   3  
      MathematicsComputer ScienceOblivious Transfer
—In pay-TV, a service provider offers TV programs and channels to users. To ensure that only authorized users gain access, conditional access systems (CAS) have been proposed. In existing CAS, users disclose to the service provider the TV... more
    • by 
    •   2  
      Oblivious TransferPay-Tv
Secure computation platforms are becoming one of the most demanded cryptographic tools utilized in diverse applications, where the performance is critical. This point makes important the optimization of every component of secure... more
    • by 
    •   4  
      Applied CryptographyCryptographyOblivious TransferWhite-Box Cryptography
We consider a new model for online secure computation on encrypted inputs in the presence of malicious adversaries. The inputs are independent of the circuit computed in the sense that they can be contributed by separate third parties.... more
    • by 
    •   3  
      Data SecurityOblivious TransferSecure Computation
We present a protocol issue that arises with the use of oblivious transfer in the malicious case of several two-party computation protocols based on Yao's garbled circuit. We describe this issue for a protocol by Pinkas (Eurocrypt 2003)... more
    • by 
    • Oblivious Transfer
We present the design and implementation of a compiler that automatically generates protocols that perform two-party computations. The input to our protocol is the specification of a computation with secret inputs (e.g., a signature... more
    • by 
    •   8  
      Computer SecurityProvable SecurityOblivious TransferThreshold Cryptography
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1-2 quantum oblivious transfer. This reduction proposed by... more
    • by 
    •   2  
      Oblivious TransferQuantum Measurement
We present a compiler for transforming an oblivious transfer (OT) protocol secure against an adaptive semi-honest adversary into one that is secure against an adaptive malicious adversary. Our compiler achieves security in the universal... more
    • by  and +1
    •   2  
      Oblivious TransferSecurity Protocol
A non-local box is an abstract device into which Alice and Bob input bits x and y respectively and receive outputs a and b respectively, where a, b are uniformly distributed and a⊕b = x∧y. Such boxes have been central to the study of... more
    • by 
    •   5  
      Quantum PhysicsOblivious TransferCommunication ComplexityBoolean function
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "trusted-party paradigm," where the protocol execution is compared with an ideal process where the outputs are computed by a trusted... more
    • by 
    •   15  
      HistoryComputer ScienceDigital SignatureCryptography
We develop cryptographically secure techniques to guarantee unconditional privacy for respondents to polls. Our constructions are efficient and practical, and are shown not to allow cheating respondents to affect the "tally" by... more
    • by 
    •   8  
      Quantum PhysicsPrivacyQuantum CryptographyPolling
One-time proxy signatures are one-time signatures for which a primary signer can delegate his or her signing capability to a proxy signer. In this work we propose two one-time proxy signature schemes with different security properties.... more
    • by 
    •   10  
      CryptographyPublic key cryptographyOblivious TransferDigital Signatures
We present an efficient construction of Yao's "garbled circuits" protocol for securely computing any two-party circuit on committed inputs. The protocol is secure in a universally composable way in the presence of malicious adversaries... more
    • by 
    •   5  
      Standard ModelOblivious TransferSecure ComputationCOL
The Distributed Computing Column covers the theory of systems that are composed of a number of interacting computing elements. These include problems of communication and networking, databases, distributed shared memory, multiprocessor... more
    • by 
    •   7  
      Applied CryptographyComputer SoftwareAppliedPhishing
We present the design and implementation of a compiler that automatically generates protocols that perform two-party computations. The input to our protocol is the specification of a computation with secret inputs (e.g., a signature... more
    • by 
    •   8  
      Computer SecurityProvable SecurityOblivious TransferThreshold Cryptography
We consider a new model for online secure computation on encrypted inputs in the presence of malicious adversaries. The inputs are independent of the circuit computed in the sense that they can be contributed by separate third parties.... more
    • by 
    •   3  
      Data SecurityOblivious TransferSecure Computation
    • by 
    •   7  
      CryptologyOblivious TransferDifferential cryptanalysisBlock Cipher
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatures discuss security only in regard of completed executions... more
    • by 
    •   4  
      Applied MathematicsPure MathematicsBlind SignaturesOblivious Transfer
Abstract. We present protocols for two flavors of oblivious transfer (OT): the Rabin and 1-out-of-2 OT based on the assumptions related to security of the McEliece cryptosystem and two zero-knowledge identification (ZKID) schemes, Stern’s... more
    • by 
    • Oblivious Transfer
See back inner page for a list of recent BRICS Report Series publications. Copies may be obtained by contacting:
    • by 
    •   3  
      MathematicsBit Error RateOblivious Transfer
Traceability schemes (also known as traitor tracing schemes) have been proposed as a method to establish copyright protection of broadcast information. With asymmetric traceability, the merchant cannot frame an innocent user, while no... more
    • by 
    •   6  
      CryptographyOblivious TransferBlind SignatureTraceability
We analyze the situation where computationally binding string commitment schemes are used to force the receiver of a BB84 encoding of a classical bitstring to measure upon reception. Since measuring induces an irreversible collapse to the... more
    • by 
    •   5  
      MathematicsQuantum InformationOblivious TransferBoolean Satisfiability
i\ (:)-OT, (one-out-of-two Bit Oblivious Transfer) is a technique by which a party S owning two secret bits b , b l , can transfer one of them b, to another party R, who chooses c. This is done in a way that does not release any bias... more
    • by 
    •   2  
      Computer ScienceOblivious Transfer