Constant-Round Oblivious Transfer in the Bounded Storage Model
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 34 references indexed in Scilit:
- Everlasting security in the bounded storage modelIEEE Transactions on Information Theory, 2002
- Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational AssumptionsPublished by Springer Nature ,2001
- Non-Interactive Oblivious Transfer and ApplicationsPublished by Springer Nature ,2001
- Practical Quantum Oblivious TransferPublished by Springer Nature ,2001
- Information Theoretically Secure Communication in the Limited Storage Space ModelPublished by Springer Nature ,1999
- Unconditional security against memory-bounded adversariesPublished by Springer Nature ,1997
- Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge ProofsPublished by Springer Nature ,1995
- Equivalence Between Two Flavours of Oblivious TransfersPublished by Springer Nature ,1988
- Achieving oblivious transfer using weakened security assumptionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1988
- Enumerative source encodingIEEE Transactions on Information Theory, 1973