A secure protocol for the oblivious transfer (extended abstract)

@article{Fischer2004ASP,
  title={A secure protocol for the oblivious transfer (extended abstract)},
  author={M. Fischer and S. Micali and C. Rackoff},
  journal={Journal of Cryptology},
  year={2004},
  volume={9},
  pages={191-195}
}
There has been a great deal of interest lately in cryptographic protocols. Vaguely, a cryptographic protocol is a mean whereby two or more people can interact in such a manner as to exchange a certain amount of information, while keeping other information secret (either from one of the participants or from another party). One interesting task for which one would like a protocol is the "oblivious transfer" introduced by Rabin in [4]. This involves two parties A and B; A would like to send a… Expand
22 Citations
New Results on Unconditionally Secure Distributed Oblivious Transfer
  • 18
  • PDF
On Unconditionally Secure Distributed Oblivious Transfer
  • 24
  • PDF
Constant-Round Oblivious Transfer in the Bounded Storage Model
  • 11
Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free
  • J. Nielsen
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • 2007
  • 33
  • PDF
Susceptible Two-Party Quantum Computations
  • PDF
Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters
  • W. Tzeng
  • Computer Science
  • IEEE Trans. Computers
  • 2004
  • 59
  • PDF
OBLIVIOUS TRANSFER FOR SECURE COMMUNICATION
Unconditional security and privacy preserving oblivious transfer
  • H. Ghodosi, I. Lee
  • Computer Science
  • 2012 7th International Conference on Computing and Convergence Technology (ICCCT)
  • 2012
...
1
2
3
...

References

SHOWING 1-5 OF 5 REFERENCES
A randomized protocol for signing contracts
  • 1,341
  • PDF
How To Exchange Secrets with Oblivious Transfer
  • M. Rabin
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • 2005
  • 1,124
  • PDF
How to exchange (secret) keys
  • M. Blum
  • Computer Science
  • STOC '83
  • 1983
  • 74
How to exchange ( secret ) keys " , 15 ACM Symp
  • Theory of Computing
  • 1983
Three applications of the oblivious transfer
  • manuscript, Univ. of Calif. at Berkeley,
  • 1981