Achieving oblivious transfer using weakened security assumptions | IEEE Conference Publication | IEEE Xplore