Distributed Oblivious Transfer

  title={Distributed Oblivious Transfer},
  author={Moni Naor and Benny Pinkas},
This work describes distributed protocols for oblivious transfer, in which the role of the sender is divided between several servers, and a chooser (receiver) must contact a threshold of these servers in order to run the oblivious transfer protocol. These distributed oblivious transfer protocols provide information theoretic security, and do not require the parties to compute exponentiations or any other kind of public key operations. Consequently, the protocols are very efficient… CONTINUE READING
Highly Influential
This paper has highly influenced 13 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 78 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 51 extracted citations

Information Security and Cryptology – ICISC 2012

Lecture Notes in Computer Science • 2012
View 8 Excerpts
Highly Influenced

Multi-Party Indirect Indexing and Applications

IACR Cryptology ePrint Archive • 2007
View 4 Excerpts
Highly Influenced

On insecurity of Naor-Pinkas' distributed oblivious transfer

Inf. Process. Lett. • 2007
View 8 Excerpts
Highly Influenced

A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol

IACR Cryptology ePrint Archive • 2013
View 5 Excerpts
Highly Influenced

Distributed Oblivious Transfer with Adaptive Queries

2010 International Conference on Communications and Mobile Computing • 2010
View 5 Excerpts
Highly Influenced

Proxy oblivious transfer protocol

First International Conference on Availability, Reliability and Security (ARES'06) • 2006
View 5 Excerpts
Highly Influenced

79 Citations

Citations per Year
Semantic Scholar estimates that this publication has 79 citations based on the available data.

See our FAQ for additional information.

Similar Papers

Loading similar papers…