On cut-and-choose oblivious transfer and its variants
From MaRDI portal
Publication:2811140
DOI10.1007/978-3-662-48797-6_17zbMATH Open1408.94941OpenAlexW2294870782MaRDI QIDQ2811140FDOQ2811140
Authors: Vladimir Kolesnikov, Ranjit Kumaresan
Publication date: 10 June 2016
Published in: Advances in Cryptology -- ASIACRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48797-6_17
Recommendations
- Secure two-party computation via cut-and-choose oblivious transfer
- Secure two-party computation via cut-and-choose oblivious transfer
- Cut-and-choose bilateral oblivious transfer
- Fast cut-and-choose-based protocols for malicious and covert adversaries
- Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings
Cited In (3)
This page was built for publication: On cut-and-choose oblivious transfer and its variants
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2811140)