DocumentCode
2014605
Title
Efficient t-out-of-n Oblivious Transfer Schemes
Author
Chang, Chin Chen ; Lai, Yeu Pong
Author_Institution
Dept. of Inf. Eng. & Comput. Sci., Feng Chia Univ., Taichung
fYear
2008
fDate
13-15 Dec. 2008
Firstpage
3
Lastpage
6
Abstract
In this paper, we shall bring up two efficient t-out-of-n oblivious transfer schemes. The first comes out handy for communication and computation. However, it has a shortcoming in revealing combined information of secrets. To solve this problem, we have developed it into the second scheme.
Keywords
computational complexity; cryptography; computational complexity; cryptography method; t-out-of-n oblivious transfer scheme; Computer science; Computer security; Cryptography; Information security; Law; Legal factors; National security; Privacy; Public key; Robustness;
fLanguage
English
Publisher
ieee
Conference_Titel
Security Technology, 2008. SECTECH '08. International Conference on
Conference_Location
Hainan Island
Print_ISBN
978-0-7695-3486-2
Type
conf
DOI
10.1109/SecTech.2008.19
Filename
4725333
Link To Document