PPRP: Preserving-privacy route planning scheme in VANETs

Y Liang, Y Liu, BB Gupta - ACM Transactions on Internet Technology, 2022 - dl.acm.org
Route planning helps a vehicle to share a message with the roadside units (RSUs) on its
path in advance, which greatly speeds the authentication between the vehicle and the RSUs …

Confidentiality protection of digital health records in cloud computing

SW Chen, DL Chiang, CH Liu, TS Chen, F Lai… - Journal of medical …, 2016 - Springer
Electronic medical records containing confidential information were uploaded to the cloud.
The cloud allows medical crews to access and manage the data and integration of medical …

Heuristics for optimizing matrix-based erasure codes for fault-tolerant storage systems

JS Plank, CD Schuman… - IEEE/IFIP International …, 2012 - ieeexplore.ieee.org
Large scale, archival and wide-area storage systems use erasure codes to protect users
from losing data due to the inevitable failures that occur. All but the most basic erasure …

Robust t-out-of-n oblivious transfer mechanism based on CRT

CC Chang, JS Lee - Journal of Network and Computer Applications, 2009 - Elsevier
Providing private communications for involved participants, the oblivious transfer (OT)
mechanism is an important component in many cryptography applications such as e …

A novel k-out-of-n oblivious transfer protocols based on bilinear pairings

Y Chen, JS Chou, XW Hou - Cryptology ePrint Archive, 2010 - eprint.iacr.org
Low bandwidth consumption is an important issue in a busy commercial network whereas
time may not be so crucial, for example, the end-of-day financial settlement for commercial …

An efficient t‐out‐of‐n oblivious transfer for information security and privacy protection

DC Lou, HF Huang - International Journal of Communication …, 2014 - Wiley Online Library
In t‐out‐of‐n oblivious transfer (OT), the receiver can only receive t messages out of n
messages sent by the sender, and the sender has no idea about which ones have been …

Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots

CC Chang, CY Lin, KC Lin - Journal of network and computer applications, 2007 - Elsevier
In this paper, we present two types of protocols that can achieve mutual anonymity in peer-to-
peer (P2P) network environments, which means the identities of the service, requesters and …

A practical lottery using oblivious transfer

YN Liu, C Cheng, T Jiang… - International Journal of …, 2016 - Wiley Online Library
In this letter, a practice‐oriented lottery protocol that allows a player to select t from the pre‐
defined n elements is proposed using the method of oblivious transfer and Lagrange …

[PDF][PDF] Enhancement of non-interactive oblivious transfer scheme

HF Huang, CC Chang, JS Yeh - Proceedings of Fourth International …, 2005 - Citeseer
In a t-out-n oblivious transfer, the receiver can only receive t messages out of n messages
sent by the sender; and the sender has no idea about which ones have been received …

Non-interactive t-out-of-n oblivious transfer based on the RSA cryptosystem

YF Chang - … Conference on Intelligent Information Hiding and …, 2007 - ieeexplore.ieee.org
A non-interactive oblivious transfer scheme based on the standard ElGamal encryption
scheme was proposed in 2003. The retrieved messages could not be verified by the receiver …