Abstract
This work describes distributed protocols for oblivious transfer, in which the role of the sender is divided between several servers, and a chooser (receiver) must contact a threshold of these servers in order to run the oblivious transfer protocol. These distributed oblivious transfer protocols provide information theoretic security, and do not require the parties to compute exponentiations or any other kind of public key operations. Consequently, the protocols are very efficient computationally.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings |
Editors | Tatsuaki Okamoto |
Publisher | Springer Verlag |
Pages | 205-219 |
Number of pages | 15 |
ISBN (Electronic) | 3540414045, 9783540414049 |
DOIs | |
State | Published - 2000 |
Externally published | Yes |
Event | 6th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2000 - Kyoto, Japan Duration: 3 Dec 2000 → 7 Dec 2000 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 1976 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 6th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2000 |
---|---|
Country/Territory | Japan |
City | Kyoto |
Period | 3/12/00 → 7/12/00 |
Bibliographical note
Publisher Copyright:© Springer-Verlag Berlin Heidelberg 2000.