UC-secure OT from LWE, revisited
From MaRDI portal
Publication:2106640
Recommendations
- Two-message statistically sender-private OT from LWE
- A Framework for Efficient and Composable Oblivious Transfer
- Universally composable oblivious transfer based on a variant of LPN
- Universally composable oblivious transfer from lossy encryption and the MceEliece assumptions
- Generic construction of UC-secure oblivious transfer
Cited in
(15)- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Secure multiparty computation with identifiable abort via vindicating release
- Oblivious transfer from weakly random self-reducible public-key cryptosystem
- Two-message statistically sender-private OT from LWE
- Two-round oblivious linear evaluation from learning with errors
- Secure quantum computation with classical communication
- A Framework for Efficient and Composable Oblivious Transfer
- Everlasting UC commitments from fully malicious PUFs
- Universal composable password authenticated key exchange for the post-quantum world
- Statistically sender-private OT from LPN and derandomization
- Round-optimal oblivious transfer and MPC from computational CSIDH
- Classically verifiable NIZK for QMA with preprocessing
- Generic construction of UC-secure oblivious transfer
- An LWE-based key transfer protocol with anonymity
- Oblivious transfer from zero-knowledge proofs. Or how to achieve round-optimal quantum oblivious transfer and zero-knowledge proofs on quantum states
This page was built for publication: UC-secure OT from LWE, revisited
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2106640)