ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Universally composable adaptive oblivious transfer (with access control) from standard assumptions
Proceedings of the 2013 ACM workshop on Digital identity management - DIM '13
◽
10.1145/2517881.2517883
◽
2013
◽
Cited By ~ 8
Author(s):
Masayuki Abe
◽
Jan Camenisch
◽
Maria Dubovitskaya
◽
Ryo Nishimaki
Keyword(s):
Access Control
◽
Oblivious Transfer
Download Full-text
Related Documents
Cited By
References
Adaptive Oblivious Transfer with Access Control from Lattice Assumptions
Theoretical Computer Science
◽
10.1016/j.tcs.2021.09.001
◽
2021
◽
Author(s):
Benoît Libert
◽
San Ling
◽
Fabrice Mouhartem
◽
Khoa Nguyen
◽
Huaxiong Wang
Keyword(s):
Access Control
◽
Oblivious Transfer
Download Full-text
An Efficient Oblivious Transfer Protocol with Access Control
2018 13th Asia Joint Conference on Information Security (AsiaJCIS)
◽
10.1109/asiajcis.2018.00014
◽
2018
◽
Author(s):
Yaqing Liao
◽
Jing Zhou
◽
Yang Yang
◽
Ou Ruan
Keyword(s):
Access Control
◽
Oblivious Transfer
◽
Transfer Protocol
Download Full-text
Adaptive Oblivious Transfer with Access Control from Lattice Assumptions
Advances in Cryptology – ASIACRYPT 2017 - Lecture Notes in Computer Science
◽
10.1007/978-3-319-70694-8_19
◽
2017
◽
pp. 533-563
◽
Cited By ~ 6
Author(s):
Benoît Libert
◽
San Ling
◽
Fabrice Mouhartem
◽
Khoa Nguyen
◽
Huaxiong Wang
Keyword(s):
Access Control
◽
Oblivious Transfer
Download Full-text
Blind attribute-based encryption and oblivious transfer with fine-grained access control
Designs Codes and Cryptography
◽
10.1007/s10623-015-0134-y
◽
2015
◽
Vol 81
(2)
◽
pp. 179-223
◽
Cited By ~ 6
Author(s):
Alfredo Rial
Keyword(s):
Access Control
◽
Oblivious Transfer
◽
Fine Grained
◽
Attribute Based Encryption
Download Full-text
Oblivious Transfer with Hidden Access Control Policies
Public Key Cryptography – PKC 2011 - Lecture Notes in Computer Science
◽
10.1007/978-3-642-19379-8_12
◽
2011
◽
pp. 192-209
◽
Cited By ~ 23
Author(s):
Jan Camenisch
◽
Maria Dubovitskaya
◽
Gregory Neven
◽
Gregory M. Zaverucha
Keyword(s):
Access Control
◽
Oblivious Transfer
◽
Control Policies
◽
Access Control Policies
Download Full-text
Oblivious Transfer with Complex Attribute-Based Access Control
Information Security and Cryptology - ICISC 2010 - Lecture Notes in Computer Science
◽
10.1007/978-3-642-24209-0_25
◽
2011
◽
pp. 370-395
◽
Cited By ~ 2
Author(s):
Lingling Xu
◽
Fangguo Zhang
Keyword(s):
Access Control
◽
Oblivious Transfer
◽
Attribute Based Access Control
Download Full-text
Unlinkable Updatable Databases and Oblivious Transfer with Access Control
Information Security and Privacy - Lecture Notes in Computer Science
◽
10.1007/978-3-030-55304-3_30
◽
2020
◽
pp. 584-604
Author(s):
Aditya Damodaran
◽
Alfredo Rial
Keyword(s):
Access Control
◽
Oblivious Transfer
Download Full-text
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
Lecture Notes in Computer Science - Security and Cryptography for Networks
◽
10.1007/978-3-642-32928-9_31
◽
2012
◽
pp. 559-579
◽
Cited By ~ 19
Author(s):
Jan Camenisch
◽
Maria Dubovitskaya
◽
Robert R. Enderlein
◽
Gregory Neven
Keyword(s):
Access Control
◽
Oblivious Transfer
◽
Attribute Based Encryption
Download Full-text
Oblivious Transfer with Fine Grained Access Control from Ciphertext Policy Attribute Based Encryption in the Standard Model
International Journal of Future Generation Communication and Networking
◽
10.14257/ijfgcn.2016.9.1.25
◽
2016
◽
Vol 9
(1)
◽
pp. 285-302
Author(s):
Xingbing Fu
◽
Fagen Li
◽
Shengke Zeng
Keyword(s):
Access Control
◽
Standard Model
◽
Oblivious Transfer
◽
Fine Grained
◽
Attribute Based Encryption
◽
The Standard Model
◽
Ciphertext Policy
Download Full-text
Oblivious Transfer with Access Control : Realizing Disjunction without Duplication
Lecture Notes in Computer Science - Pairing-Based Cryptography - Pairing 2010
◽
10.1007/978-3-642-17455-1_7
◽
2010
◽
pp. 96-115
◽
Cited By ~ 8
Author(s):
Ye Zhang
◽
Man Ho Au
◽
Duncan S. Wong
◽
Qiong Huang
◽
Nikos Mamoulis
◽
...
Keyword(s):
Access Control
◽
Oblivious Transfer
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close