Generalized oblivious transfer by secret sharing
From MaRDI portal
Recommendations
- Alternative Protocols for Generalized Oblivious Transfer
- Computational and Information Science
- scientific article; zbMATH DE number 2127887
- scientific article; zbMATH DE number 1952770
- Computationally secure oblivious transfer
- Quantum \(m\)-out-of-\(n\) oblivious transfer
- A new efficient protocol for \(k\)-out-of-\(n\) oblivious transfer
- Comments on the `m out of n oblivious transfer'
- Oblivious transfer and polynomial evaluation
Cites work
- scientific article; zbMATH DE number 1722674 (Why is no real title available?)
- scientific article; zbMATH DE number 3856987 (Why is no real title available?)
- scientific article; zbMATH DE number 4051007 (Why is no real title available?)
- scientific article; zbMATH DE number 4123667 (Why is no real title available?)
- Alternative Protocols for Generalized Oblivious Transfer
- Characterizing Ideal Weighted Threshold Secret Sharing
- Computationally secure oblivious transfer
- Hierarchical threshold secret sharing
- Oblivious Polynomial Evaluation
- Oblivious transfers and intersecting codes
- On the Optimization of Bipartite Secret Sharing Schemes
Cited in
(19)- scientific article; zbMATH DE number 708832 (Why is no real title available?)
- ACE with compact ciphertext size and decentralized sanitizers
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Secret-sharing schemes for very dense graphs
- Upslices, downslices, and secret-sharing with complexity of \(1.5^n\)
- ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls
- Alternative Protocols for Generalized Oblivious Transfer
- Actively secure arithmetic computation and VOLE with constant computational overhead
- Secret sharing schemes for dense forbidden graphs
- Construction of arithmetic secret sharing schemes by using torsion limits
- Ideal uniform multipartite secret sharing schemes
- Distributed protocols for oblivious transfer and polynomial evaluation
- Computational and Information Science
- Constructing ideal secret sharing schemes based on Chinese remainder theorem
- A group identification protocol with leakage resilience of secret sharing scheme
- Generalizing efficient multiparty computation
- Restricted adaptive oblivious transfer
- A note on ``Selling multiple secrets to a single buyer
- Secret-Sharing Schemes: A Survey
This page was built for publication: Generalized oblivious transfer by secret sharing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q629875)