A general model for oblivious transfer
Ghodosi, Hossein (2007) A general model for oblivious transfer. Proceedings of the Sixth International Workshop for Applied PKC. Sixth International Workshop for Applied PKC (IWAP2007) , 3-4 DEC 2007, Perth, WA, Australia , pp. 79-87.
|PDF (Published Version) - Repository staff only - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader|
View at Publisher Website: http://conferences.scis.ecu.edu.au/IWAP2...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing Oblivious Transfer using physical means, e.g., via a noisy channel or quantum cryptography. However, some of these reductions are not particularly efficient. .. '. Using tamper-proof smart cards, we propose some radically different approaches to the Oblivious Transfer problem. Despite the simplicity of our model, we achieve unconditional security and privacy for both the sender and receiver. In contrast to all known oblivious transfer protocols, which require extensive computations, the proposed schemes are very computationally efficient.
Repository Staff Only: item control page