Paper 2011/001
Practical Frameworks For -Out-Of- Oblivious Transfer With Security Against Covert and Malicious Adversaries
Zeng Bing, Tang Xueming, Xu Peng, and Jing Jiandu
Abstract
We present two practical frameworks for
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Major revision. IEEE Transactions on Information Forensics and Security 7(2): 465-479, 2012
- DOI
- 10.1109/TIFS.2012.2184096
- Keywords
- oblivious transfersecure two-party computation
- Contact author(s)
- zeng bing zb @ gmail com
- History
- 2016-03-20: revised
- 2011-01-05: received
- See all versions
- Short URL
- https://ia.cr/2011/001
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/001, author = {Zeng Bing and Tang Xueming and Xu Peng and Jing Jiandu}, title = {Practical Frameworks For $h$-Out-Of-$n$ Oblivious Transfer With Security Against Covert and Malicious Adversaries}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/001}, year = {2011}, doi = {10.1109/TIFS.2012.2184096}, url = {https://eprint.iacr.org/2011/001} }