m out of n oblivious transfer

Yi Mu, Junqi Zhang, Vijay Varadharajan

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

40 Citations (Scopus)

Abstract

We present three novel constructions of m out of n oblivious transfer, which demonstrate significant improvement over the existing schemes in terms of completeness, robustness and flexibility. We also show how to construct a non-interactive m out of n oblivious transfer, based on discrete logarithm. These constructions have potential applicability in electronic commerce.

Original languageEnglish
Title of host publicationInformation Security and Privacy
Subtitle of host publication7th Australasian Conference (ACISP 2002) Proceedings
Place of PublicationBerlin; Heidelberg
PublisherSpringer, Springer Nature
Pages395-405
Number of pages11
Volume2384
ISBN (Print)3540438610, 9783540438618
Publication statusPublished - 2002
Event7th Australasian Conference on Information Security and Privacy, ACISP 2002 - Melbourne, Australia
Duration: 3 Jul 20025 Jul 2002

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2384
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other7th Australasian Conference on Information Security and Privacy, ACISP 2002
Country/TerritoryAustralia
CityMelbourne
Period3/07/025/07/02

Fingerprint

Dive into the research topics of 'm out of n oblivious transfer'. Together they form a unique fingerprint.

Cite this