Is it possible to develop an information theoretic basis for oblivious transfer? briefly explain.

aneesha
Topic: Security
Answer this Question

Answers

2 total
jimlynch
Vote Up (11)

Your best bet is to check out some of the search engines and see what you come up with. Here's a DuckDuckGo search on it:

https://duckduckgo.com/?q=information+theoretic+basis+for+oblivious+tran...

rtrembley
Vote Up (7)

I’m not a cryptologist, so this is above my pay grade. Are you taking a course? You might want to search some of the scholarly articles using Google Scholar (scholar.google.com). You might also want to check out crypto.stackexchange.com where there is a Q&A section, although it is officially in beta. 

Ask a question

Join Now or Sign In to ask a question.
Four alleged members of an international computer hacking ring face charges in the U.S. of breaking into the computer networks of the U.S. Army and several tech companies and stealing several software packages, including programs used to train Army helicopter pilots.
A number of antivirus products caught all the malware the testing lab threw at it. But only a few were free.
Many banks with less than $50 billion in assets have a problem that payment systems like Apple Pay will make even more attractive to exploit, a team of security researchers says.
Cisco Systems and Oracle are hard at work identifying networking and other products in their portfolios that are affected by the critical Shellshock vulnerability.
A privacy watchdog filed a complaint with the Federal Trade Commission against a community college district in Arizona that lost the personal data of 2.5 million students and employees in two data breaches.
China has effectively cleared the iPhone 6 for sale in the country, granting the product a license, but not before a government regulator demanded Apple make some security changes in the iOS operating system to fix suspected flaws in the software.
Updated patches are in the works, but criminals are targeting the flaw now.
Apple released a patch Monday for Shellshock, a serious software vulnerability disclosed last week, although the company had said it posed no risk to most users.
SuperValu, the grocery store operator hit by a cyberattack in June and July, has suffered a second attack on its payment processing system, it said Monday.
The CEO of a Pakistani company has been indicted in the U.S. for selling a product called StealthGenie that buyers could use to monitor calls, texts, videos and other communications on other people's mobile phones, the U.S. Department of Justice said.

White Papers & Webcasts

See more White Papers | Webcasts

randomness