Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens
From MaRDI portal
Publication:3408203
DOI10.1007/978-3-642-11799-2_20zbMath1274.94089OpenAlexW1889699207MaRDI QIDQ3408203
Publication date: 24 February 2010
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_20
Related Items (9)
Pattern matching on encrypted streams ⋮ Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens ⋮ (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens ⋮ Quadratic multiparty randomized encodings beyond honest majority and their applications ⋮ Non-interactive secure computation from one-way functions ⋮ Secure Outsourced Computation ⋮ Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs ⋮ Secure Set Intersection with Untrusted Hardware Tokens ⋮ Founding Cryptography on Tamper-Proof Hardware Tokens
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Information-theoretically secure protocols and security under composition
- Founding Cryptography on Tamper-Proof Hardware Tokens
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
- One-Time Programs
- Universally Composable Multiparty Computation with Partially Isolated Parties
- Resettably Secure Computation
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Advances in Cryptology - CRYPTO 2003
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
- Universally Composable Multi-party Computation Using Tamper-Proof Hardware
- Efficient Two Party and Multi Party Computation Against Covert Adversaries
- Isolated Proofs of Knowledge and Isolated Zero Knowledge
- New Constructions for UC Secure Computation Using Tamper-Proof Hardware
- Theory of Cryptography
This page was built for publication: Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens