PPRP: Preserving-privacy route planning scheme in VANETs
Route planning helps a vehicle to share a message with the roadside units (RSUs) on its
path in advance, which greatly speeds the authentication between the vehicle and the RSUs …
path in advance, which greatly speeds the authentication between the vehicle and the RSUs …
Confidentiality protection of digital health records in cloud computing
Electronic medical records containing confidential information were uploaded to the cloud.
The cloud allows medical crews to access and manage the data and integration of medical …
The cloud allows medical crews to access and manage the data and integration of medical …
Heuristics for optimizing matrix-based erasure codes for fault-tolerant storage systems
JS Plank, CD Schuman… - IEEE/IFIP International …, 2012 - ieeexplore.ieee.org
Large scale, archival and wide-area storage systems use erasure codes to protect users
from losing data due to the inevitable failures that occur. All but the most basic erasure …
from losing data due to the inevitable failures that occur. All but the most basic erasure …
Robust t-out-of-n oblivious transfer mechanism based on CRT
CC Chang, JS Lee - Journal of Network and Computer Applications, 2009 - Elsevier
Providing private communications for involved participants, the oblivious transfer (OT)
mechanism is an important component in many cryptography applications such as e …
mechanism is an important component in many cryptography applications such as e …
A novel k-out-of-n oblivious transfer protocols based on bilinear pairings
Y Chen, JS Chou, XW Hou - Cryptology ePrint Archive, 2010 - eprint.iacr.org
Low bandwidth consumption is an important issue in a busy commercial network whereas
time may not be so crucial, for example, the end-of-day financial settlement for commercial …
time may not be so crucial, for example, the end-of-day financial settlement for commercial …
An efficient t‐out‐of‐n oblivious transfer for information security and privacy protection
DC Lou, HF Huang - International Journal of Communication …, 2014 - Wiley Online Library
In t‐out‐of‐n oblivious transfer (OT), the receiver can only receive t messages out of n
messages sent by the sender, and the sender has no idea about which ones have been …
messages sent by the sender, and the sender has no idea about which ones have been …
Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots
In this paper, we present two types of protocols that can achieve mutual anonymity in peer-to-
peer (P2P) network environments, which means the identities of the service, requesters and …
peer (P2P) network environments, which means the identities of the service, requesters and …
A practical lottery using oblivious transfer
In this letter, a practice‐oriented lottery protocol that allows a player to select t from the pre‐
defined n elements is proposed using the method of oblivious transfer and Lagrange …
defined n elements is proposed using the method of oblivious transfer and Lagrange …
[PDF][PDF] Enhancement of non-interactive oblivious transfer scheme
In a t-out-n oblivious transfer, the receiver can only receive t messages out of n messages
sent by the sender; and the sender has no idea about which ones have been received …
sent by the sender; and the sender has no idea about which ones have been received …
Non-interactive t-out-of-n oblivious transfer based on the RSA cryptosystem
YF Chang - … Conference on Intelligent Information Hiding and …, 2007 - ieeexplore.ieee.org
A non-interactive oblivious transfer scheme based on the standard ElGamal encryption
scheme was proposed in 2003. The retrieved messages could not be verified by the receiver …
scheme was proposed in 2003. The retrieved messages could not be verified by the receiver …