Access Restriction

Author Lempel, Abraham ♦ Even, Shimon ♦ Goldreich, Oded
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract Randomized protocols for signing contracts, certified mail, and flipping a coin are presented. The protocols use a 1-out-of-2 oblivious transfer subprotocol which is axiomatically defined.The 1-out-of-2 oblivious transfer allows one party to transfer exactly one secret, out of two recognizable secrets, to his counterpart. The first (second) secret is received with probability one half, while the sender is ignorant of which secret has been received.An implementation of the 1-out-of-2 oblivious transfer, using any public key cryptosystem, is presented.
Description Affiliation: MIT Laboratory for Computer Science, Cambridge, MA (Goldreich, Oded) || Duke Univ., Durham, NC (Even, Shimon) || Technion, Haifa, Israel (Lempel, Abraham)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 28
Issue Number 6
Page Count 11
Starting Page 637
Ending Page 647

Open content in new tab

   Open content in new tab
Source: ACM Digital Library