DocumentCode :
3174099
Title :
Achieving oblivious transfer using weakened security assumptions
Author :
Crépeau, Claude ; Kilian, Joe
Author_Institution :
MIT, Cambridge, MA, USA
fYear :
1988
fDate :
24-26 Oct 1988
Firstpage :
42
Lastpage :
52
Abstract :
The authors present some general techniques for establishing the cryptographic strength of a wide variety of games. As case studies, they analyze some weakened versions of the standard forms of oblivious transfer. They also consider variants of oblivious transfer that are motivated by coding theory and physics. Among their results, they show that a noisy telephone line is in fact a very sophisticated cryptographic device. They also present an application to quantum cryptography
Keywords :
cryptography; coding theory; cryptographic strength; games; noisy telephone line; oblivious transfer; physics; quantum cryptography; weakened security; Circuits; Codes; Computer science; Computer security; Cryptographic protocols; Cryptography; Marine vehicles; Mathematics; Physics; Telephony;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Foundations of Computer Science, 1988., 29th Annual Symposium on
Conference_Location :
White Plains, NY
Print_ISBN :
0-8186-0877-3
Type :
conf
DOI :
10.1109/SFCS.1988.21920
Filename :
21920
Link To Document :
بازگشت