Is it possible to develop an information theoretic basis for oblivious transfer? briefly explain.

aneesha
Topic: Security
Answer this Question

Answers

2 total
jimlynch
Vote Up (10)

Your best bet is to check out some of the search engines and see what you come up with. Here's a DuckDuckGo search on it:

https://duckduckgo.com/?q=information+theoretic+basis+for+oblivious+tran...

rtrembley
Vote Up (7)

I’m not a cryptologist, so this is above my pay grade. Are you taking a course? You might want to search some of the scholarly articles using Google Scholar (scholar.google.com). You might also want to check out crypto.stackexchange.com where there is a Q&A section, although it is officially in beta. 

Ask a question

Join Now or Sign In to ask a question.
Public certificate authorities (CAs) are warning that as of Nov. 1 they will reject requests for internal SSL server certificates that don't conform to new internal domain naming and IP address conventions designed to safeguard networks.
European data protection authorities still have questions after meeting with Google, Microsoft and Yahoo about the implementation of a recent ruling that gave European citizens the right to be forgotten by search engines.
An iPhone user has filed a lawsuit for invasion of privacy against Apple, about a week after a Chinese state broadcaster raised security concerns about the device's location-tracking functions.
Handling a software flaw can be messy, both for a security researcher who found it and for the company it affects. But a new set of guidelines aims to make that interaction less mysterious and confrontational.
A hacker group calling itself "Anonymous Kenya" has poked holes at the government's cybersecurity preparedness by hacking two official Twitter accounts.
New guidance from Microsoft researchers suggests that users re-use simple passwords and avoid password management services.
Apple has "inadvertently admitted" to creating a "backdoor" in iOS, according to a post by a forensics scientist, iOS author and ex-hacker.
A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far.
Google, Microsoft and Yahoo are meeting with European data protection authorities Thursday to discuss how to implement a recent ruling that gives people the right to have personal information excluded from search results.
Hackers have stolen user contact information, including email addresses and phone numbers, from the website of the European Central Bank and attempted to extort money from the institution.
randomness