A survey of oblivious transfer protocol

VK Yadav, N Andola, S Verma… - ACM Computing Surveys …, 2022 - dl.acm.org
Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide
range of applications such as secure multi-party computation, private information retrieval …

Searchain: Blockchain-based private keyword search in decentralized storage

P Jiang, F Guo, K Liang, J Lai, Q Wen - Future Generation Computer …, 2020 - Elsevier
Blockchain-based distributed storage enables users to share data without the help of a
centralized service provider. Decentralization eliminates traditional data loss brought by …

Simulatable adaptive oblivious transfer

J Camenisch, G Neven, A Shelat - … on the Theory and Applications of …, 2007 - Springer
We study an adaptive variant of oblivious transfer in which a sender has N messages, of
which a receiver can adaptively choose to receive k one-after-the-other, in such a way that …

SoK: oblivious pseudorandom functions

S Casacuberta, J Hesse… - 2022 IEEE 7th European …, 2022 - ieeexplore.ieee.org
In recent years, oblivious pseudorandom functions (OPRFs) have become a ubiquitous
primitive used in cryptographic protocols and privacy-preserving technologies. The growing …

Fast secure computation of set intersection

S Jarecki, X Liu - Security and Cryptography for Networks: 7th …, 2010 - Springer
A secure set intersection protocol between sender S and receiver R on respective inputs X
and Y st| X|,| Y|≤ n, allows R to learn X∩ Y while S learns nothing about R's inputs. In other …

Blind identity-based encryption and simulatable oblivious transfer

M Green, S Hohenberger - International Conference on the Theory and …, 2007 - Springer
In an identity-based encryption (IBE) scheme, there is a key extraction protocol where a user
submits an identity string to a master authority who then returns the corresponding secret …

Selective, accurate, and timely self-invalidation using last-touch prediction

AC Lai, B Falsafi - ACM SIGARCH Computer Architecture News, 2000 - dl.acm.org
Communication in cache-coherent distributed shared memory (DSM) often requires
invalidating (or writing back) cached copies of a memory block, incurring high overheads …

Distributed E-voting and E-bidding systems based on smart contract

R Tso, ZY Liu, JH Hsiao - Electronics, 2019 - mdpi.com
Traditional voting and bidding systems largely rely on paperwork and human resources
throughout the voting process, which can incur high costs in terms of both time and money …

Optimal distributed password verification

J Camenisch, A Lehmann, G Neven - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
We present a highly efficient cryptographic protocol to protect user passwords against server
compromise by distributing the capability to verify passwords over multiple servers …

Universally composable adaptive oblivious transfer

M Green, S Hohenberger - International Conference on the Theory and …, 2008 - Springer
In an oblivious transfer (OT) protocol, a Sender with messages M 1,..., MN and a Receiver
with indices σ 1,..., σ k∈ 1, N interact in such a way that at the end the Receiver obtains …