Blockchain-based distributed storage enables users to share data without the help of a centralized service provider. Decentralization eliminates traditional data loss brought by …
We study an adaptive variant of oblivious transfer in which a sender has N messages, of which a receiver can adaptively choose to receive k one-after-the-other, in such a way that …
In recent years, oblivious pseudorandom functions (OPRFs) have become a ubiquitous primitive used in cryptographic protocols and privacy-preserving technologies. The growing …
S Jarecki, X Liu - Security and Cryptography for Networks: 7th …, 2010 - Springer
A secure set intersection protocol between sender S and receiver R on respective inputs X and Y st| X|,| Y|≤ n, allows R to learn X∩ Y while S learns nothing about R's inputs. In other …
M Green, S Hohenberger - International Conference on the Theory and …, 2007 - Springer
In an identity-based encryption (IBE) scheme, there is a key extraction protocol where a user submits an identity string to a master authority who then returns the corresponding secret …
AC Lai, B Falsafi - ACM SIGARCH Computer Architecture News, 2000 - dl.acm.org
Communication in cache-coherent distributed shared memory (DSM) often requires invalidating (or writing back) cached copies of a memory block, incurring high overheads …
Traditional voting and bidding systems largely rely on paperwork and human resources throughout the voting process, which can incur high costs in terms of both time and money …
We present a highly efficient cryptographic protocol to protect user passwords against server compromise by distributing the capability to verify passwords over multiple servers …
M Green, S Hohenberger - International Conference on the Theory and …, 2008 - Springer
In an oblivious transfer (OT) protocol, a Sender with messages M 1,..., MN and a Receiver with indices σ 1,..., σ k∈ 1, N interact in such a way that at the end the Receiver obtains …