A survey of oblivious transfer protocol

VK Yadav, N Andola, S Verma… - ACM Computing Surveys …, 2022 - dl.acm.org
Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide
range of applications such as secure multi-party computation, private information retrieval …

Privacy in targeted advertising on mobile devices: a survey

I Ullah, R Boreli, SS Kanhere - International Journal of Information …, 2023 - Springer
Targeted advertising has transformed the marketing landscape for a wide variety of
businesses, by creating new opportunities for advertisers to reach prospective customers by …

Towards differential access control and privacy-preserving for secure media data sharing in the cloud

T Zheng, Y Luo, T Zhou, Z Cai - Computers & Security, 2022 - Elsevier
The development of cloud computing techniques has promoted the continuous sharing of a
tremendous amount of media data. However, the involved parties in such processes usually …

Privacy in targeted advertising: A survey

I Ullah, R Boreli, SS Kanhere - arXiv preprint arXiv:2009.06861, 2020 - arxiv.org
Targeted advertising has transformed the marketing landscape for a wide variety of
businesses, by creating new opportunities for advertisers to reach prospective customers by …

A privacy‐preserving data transmission scheme based on oblivious transfer and blockchain technology in the smart healthcare

H Yang, J Shen, J Lu, T Zhou, X Xia… - Security and …, 2021 - Wiley Online Library
With the development of the Internet of Things and the demand for telemedicine, the smart
healthcare system has attracted much attention in recent years. As a platform for medical …

[PDF][PDF] CHVote System Specification.

R Haenni, RE Koenig, P Locher… - IACR Cryptol. ePrint …, 2017 - researchgate.net
Over many years, the State of Geneva has been one of the worldwide pioneers in offering
Internet elections to their citizens. The project, which was initiated in 2001, was one of first …

TargetFinder: A privacy preserving system for locating targets through IoT cameras

Y Khazbak, J Qiu, T Tan, G Cao - ACM Transactions on Internet of Things, 2020 - dl.acm.org
With the proliferation of IoT cameras, it is possible to use crowdsourced videos to help find
interested targets (eg, crime suspect, lost child, lost vehicle) on demand. Due to the ubiquity …

Cast-as-intended verification in electronic elections based on oblivious transfer

R Haenni, RE Koenig, E Dubuis - … Joint Conference, E-Vote-ID 2016 …, 2017 - Springer
In this paper, we propose a new method for cast-as-intended verification in remote electronic
voting. We consider a setting, in which voters receive personalized verification code sheets …

A communication-efficient private matching scheme in Client–Server model

ME Wu, SY Chang, CJ Lu, HM Sun - Information sciences, 2014 - Elsevier
Abstract In a Private Matching (PM) scheme, the client C has a dataset X of m elements, and
the server S has a dataset Y of n elements. The client C can learn the set intersection X∩ Y …

Secure evaluation protocol for personalized medicine

M Djatmiko, A Friedman, R Boreli, F Lawrence… - Proceedings of the 13th …, 2014 - dl.acm.org
The increasing availability and use of genome data for applications like personalized
medicine have created opportunities for the improved diagnosis and treatment of various …