More efficient oblivious transfer extensions with security for malicious adversaries
From MaRDI portal
Publication:2948348
Recommendations
Cited in
(33)- Efficient two-party exponentiation from quotient transfer
- More efficient oblivious transfer extensions
- The simplest protocol for oblivious transfer
- On the round complexity of OT extension
- Improved OT extension for transferring short secrets
- Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost
- On the feasibility of extending oblivious transfer
- Two-round MPC: information-theoretic and black-box
- Efficient, actively secure MPC with a dishonest majority: a survey
- Extending oblivious transfer efficiently or -- how to get active security with constant cryptographic overhead
- Extending white-box cryptography based oblivious transfer protocol
- Blazing fast OT for three-round UC OT extension
- Stacked garbling for disjunctive zero-knowledge proofs
- On the complexity of additively homomorphic UC commitments
- Actively secure arithmetic computation and VOLE with constant computational overhead
- Survey of information security
- Adaptively code-correlation robustness functions and its applications to private set intersection
- Extending oblivious transfer with low communication via key-homomorphic PRFs
- Private set operations from multi-query reverse private membership test
- Efficient constant-round MPC with identifiable abort and public verifiability
- On the feasibility of extending oblivious transfer
- Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model
- From attack on Feige-Shamir to construction of oblivious transfer
- Faster secure two-party computation in the single-execution setting
- Non-interactive secure 2PC in the offline/online and batch settings
- Encryption switching protocols
- More efficient constant-round multi-party computation from BMR and SHE
- Actively secure 1-out-of-\(N\) OT extension with application to private set intersection
- SoftSpokenOT: quieter OT extension from small-field silent VOLE in the Minicrypt model
- Actively secure OT extension with optimal overhead
- Low cost constant round MPC combining BMR and oblivious transfer
- Improved private set intersection against malicious adversaries
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: More efficient oblivious transfer extensions with security for malicious adversaries
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2948348)