[go: up one dir, main page]

Xu et al., 2014 - Google Patents

Timed‐release oblivious transfer

Xu et al., 2014

View PDF
Document ID
4185995731628892610
Author
Xu L
Zhang F
Tang S
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

We study a variant of oblivious transfer, we called timed‐release oblivious transfer that permits a sender to restrict when each receiver may open his chosen messages, without learning anything about the receiver's message choices. To achieve this functionality, we …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Damgård et al. Balancing privacy and accountability in blockchain identity management
He et al. An efficient and provably‐secure certificateless signature scheme without bilinear pairings
Gong et al. Further improvement of a certificateless signature scheme without pairing
Tian et al. Cryptanalysis of a certificateless signature scheme without pairings
Tsai et al. Provably secure revocable id‐based signature in the standard model
Zhang et al. Secure and efficient data‐sharing in clouds
Shen et al. Verifiable privacy-preserving federated learning under multiple encrypted keys
Li et al. New attribute–based authentication and its application in anonymous cloud access service
Al-Riyami et al. Escrow-free encryption supporting cryptographic workflow
Qin et al. Simultaneous authentication and secrecy in identity-based data upload to cloud
Lu et al. Improved certificate‐based signature scheme without random oracles
Battagliola et al. Provably unforgeable threshold EdDSA with an offline participant and trustless setup
Abe et al. Universally composable adaptive oblivious transfer (with access control) from standard assumptions
Zhang et al. Attack on Chen et al.'s certificateless aggregate signature scheme
Kuchta et al. Generic framework for attribute-based group signature
Xu et al. Timed‐release oblivious transfer
Tian et al. A systematic method to design strong designated verifier signature without random oracles
Wang et al. Simulatable and secure certificate‐based threshold signature without pairings
Wu et al. A provably secure revocable ID‐based authenticated group key exchange protocol with identifying malicious participants
Zhang et al. Identity‐based optimistic fair exchange in the standard model
Shin et al. AAnA: Anonymous authentication and authorization based on short traceable signatures
Lin et al. F2P‐ABS: A Fast and Secure Attribute‐Based Signature for Mobile Platforms
Guo et al. Privacy-preserving and efficient attributes proof based on selective aggregate CL-signature scheme
Wen et al. Private mutual authentications with fuzzy matching
Luo et al. Identity-based group encryption