Efficient oblivious transfers with access control
From MaRDI portal
Publication:453798
DOI10.1016/j.camwa.2011.11.048zbMath1247.94035OpenAlexW1966837220MaRDI QIDQ453798
Yi Mu, Jinguang Han, Willy Susilo, Jun Yan
Publication date: 30 September 2012
Published in: Computers \& Mathematics with Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.camwa.2011.11.048
Cryptography (94A60) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items (3)
Blind attribute-based encryption and oblivious transfer with fine-grained access control ⋮ Efficient Traceable Oblivious Transfer and Its Applications ⋮ Threshold changeable secret sharing with secure secret reconstruction
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Security, privacy and trust in modern data management.
- Computationally secure oblivious transfer
- Oblivious transfer and polynomial evaluation
- Efficient Dynamic k-Times Anonymous Authentication
- Oblivious Transfer with Hidden Access Control Policies
- Constant-Size Dynamic k-TAA
- Privacy Preserving Keyword Searches on Remote Encrypted Data
- Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
- Simple Adaptive Oblivious Transfer without Random Oracle
- Conditional Oblivious Transfer and Timed-Release Encryption
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Simulatable Adaptive Oblivious Transfer
- k-Times Anonymous Authentication (Extended Abstract)
- Public Key Cryptography - PKC 2005
- Oblivious signature-based envelope
- Public Key Cryptography - PKC 2006
This page was built for publication: Efficient oblivious transfers with access control