Is it possible to develop an information theoretic basis for oblivious transfer? briefly explain.

aneesha
Topic: Security
Answer this Question

Answers

2 total
jimlynch
Vote Up (11)

Your best bet is to check out some of the search engines and see what you come up with. Here's a DuckDuckGo search on it:

https://duckduckgo.com/?q=information+theoretic+basis+for+oblivious+tran...

rtrembley
Vote Up (7)

I’m not a cryptologist, so this is above my pay grade. Are you taking a course? You might want to search some of the scholarly articles using Google Scholar (scholar.google.com). You might also want to check out crypto.stackexchange.com where there is a Q&A section, although it is officially in beta. 

Ask a question

Join Now or Sign In to ask a question.
Former U.S. Secretary of State Hillary Clinton called for a "global compact" on surveillance and the use of collected data, saying the U.S. isn't the only country that does it and American technology companies are unfairly targeted for the government's actions.
Electric carmaker Tesla Motors wants security researchers to hack its vehicles. The Silicon Valley based high-tech carmaker will hire up to 30 full-time hackers whose job will be to find and close vulnerabilities in the sophisticated firmware that controls its cars.
Two recent vulnerabilities are examples of problems that could have been avoided if we had just applied the lessons already learned in similar contexts.
Windows XP users may now download a fourth service pack for the 13-year-old operating system, but it isn't coming from Microsoft.
The growing number of data breaches resulting in massive numbers of payment cards being stolen from retail stores and other businesses is occurring because they're failing to keep up with the Payment Card Industry's data security standard, according to the PCI Security Standards Council.
Email addresses and encrypted passwords of around 97,000 users who tested early builds of the Bugzilla bug tracking software were left exposed for three months following a server migration.
A U.S. Federal Bureau of Investigation spokesman said Wednesday the agency is working with the Secret Service to determine the "scope" of reported cyberattacks against several financial institutions.
A payment card industry security consortium warned retailers on Wednesday of the urgency to secure their systems against "Backoff," a malicious software program that steals card numbers.
Based on data gathered over the first six months of 2014, security researchers from IBM X-Force predict that the number of publicly reported vulnerabilities will drop to under 8,000 this year, a first since 2011.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness