Distributed oblivious transfer

Moni Naor, Benny Pinkas

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

48 Scopus citations

Abstract

This work describes distributed protocols for oblivious transfer, in which the role of the sender is divided between several servers, and a chooser (receiver) must contact a threshold of these servers in order to run the oblivious transfer protocol. These distributed oblivious transfer protocols provide information theoretic security, and do not require the parties to compute exponentiations or any other kind of public key operations. Consequently, the protocols are very efficient computationally.

Original languageEnglish
Title of host publicationAdvances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsTatsuaki Okamoto
PublisherSpringer Verlag
Pages205-219
Number of pages15
ISBN (Electronic)3540414045, 9783540414049
DOIs
StatePublished - 2000
Externally publishedYes
Event6th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2000 - Kyoto, Japan
Duration: 3 Dec 20007 Dec 2000

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1976
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2000
Country/TerritoryJapan
CityKyoto
Period3/12/007/12/00

Bibliographical note

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2000.

Fingerprint

Dive into the research topics of 'Distributed oblivious transfer'. Together they form a unique fingerprint.

Cite this