Xu et al., 2014 - Google Patents
Timed‐release oblivious transferXu et al., 2014
View PDF- Document ID
- 4185995731628892610
- Author
- Xu L
- Zhang F
- Tang S
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
We study a variant of oblivious transfer, we called timed‐release oblivious transfer that permits a sender to restrict when each receiver may open his chosen messages, without learning anything about the receiver's message choices. To achieve this functionality, we …
- 238000010276 construction 0 abstract description 23
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Damgård et al. | Balancing privacy and accountability in blockchain identity management | |
He et al. | An efficient and provably‐secure certificateless signature scheme without bilinear pairings | |
Gong et al. | Further improvement of a certificateless signature scheme without pairing | |
Tian et al. | Cryptanalysis of a certificateless signature scheme without pairings | |
Tsai et al. | Provably secure revocable id‐based signature in the standard model | |
Zhang et al. | Secure and efficient data‐sharing in clouds | |
Shen et al. | Verifiable privacy-preserving federated learning under multiple encrypted keys | |
Li et al. | New attribute–based authentication and its application in anonymous cloud access service | |
Al-Riyami et al. | Escrow-free encryption supporting cryptographic workflow | |
Qin et al. | Simultaneous authentication and secrecy in identity-based data upload to cloud | |
Lu et al. | Improved certificate‐based signature scheme without random oracles | |
Battagliola et al. | Provably unforgeable threshold EdDSA with an offline participant and trustless setup | |
Abe et al. | Universally composable adaptive oblivious transfer (with access control) from standard assumptions | |
Zhang et al. | Attack on Chen et al.'s certificateless aggregate signature scheme | |
Kuchta et al. | Generic framework for attribute-based group signature | |
Xu et al. | Timed‐release oblivious transfer | |
Tian et al. | A systematic method to design strong designated verifier signature without random oracles | |
Wang et al. | Simulatable and secure certificate‐based threshold signature without pairings | |
Wu et al. | A provably secure revocable ID‐based authenticated group key exchange protocol with identifying malicious participants | |
Zhang et al. | Identity‐based optimistic fair exchange in the standard model | |
Shin et al. | AAnA: Anonymous authentication and authorization based on short traceable signatures | |
Lin et al. | F2P‐ABS: A Fast and Secure Attribute‐Based Signature for Mobile Platforms | |
Guo et al. | Privacy-preserving and efficient attributes proof based on selective aggregate CL-signature scheme | |
Wen et al. | Private mutual authentications with fuzzy matching | |
Luo et al. | Identity-based group encryption |