Laconic oblivious transfer and its applications

From MaRDI portal
Publication:1678362

DOI10.1007/978-3-319-63715-0_2zbMath1409.94866OpenAlexW2724564245MaRDI QIDQ1678362

Chongwon Cho, Peihan Miao, Sanjam Garg, Divya Gupta, Nico Döttling, Antigoni Polychroniadou

Publication date: 15 November 2017

Full work available at URL: https://doi.org/10.1007/978-3-319-63715-0_2



Related Items

Registration-based encryption: removing private-key generator from IBE, A simple construction of iO for Turing machines, Succinct garbling schemes from functional encryption through a local simulation paradigm, Adaptively secure laconic function evaluation for \(\mathsf{NC}^1\), An improved affine equivalence algorithm for random permutations, Anonymous IBE, leakage resilience and circular security from new assumptions, Batch-OT with optimal rate, Adaptively secure garbling schemes for parallel computations, Bounded Collusion ABE for TMs from IBE, Efficient laconic cryptography from learning with errors, Broadcast, trace and revoke with optimal parameters from polynomial hardness, Laconic function evaluation for Turing machines, IBE with incompressible master secret and small identity secrets, Bounded functional encryption for Turing machines: adaptive security from general assumptions, Cryptographic primitives with hinting property, Collusion-resistant functional encryption for RAMs, Universal amplification of KDM security: from 1-key circular to multi-key KDM, How to build a trapdoor function from an encryption scheme, One-time programs from commodity hardware, Universal ring signatures in the standard model, Laconic private set intersection and applications, Amortizing rate-1 OT and applications to PIR and PSI, Offline witness encryption with semi-adaptive security, Adaptively secure MPC with sublinear communication complexity, Incompressible encodings, New constructions of hinting PRGs, OWFs with encryption, and more, Verifiable registration-based encryption, Chosen ciphertext security from injective trapdoor functions, Succinct non-interactive secure computation