Actively secure OT extension with optimal overhead
From MaRDI portal
Publication:3457136
Recommendations
- Actively secure 1-out-of-\(N\) OT extension with application to private set intersection
- Extending oblivious transfer efficiently or -- how to get active security with constant cryptographic overhead
- More efficient oblivious transfer extensions
- More efficient oblivious transfer extensions with security for malicious adversaries
- SoftSpokenOT: quieter OT extension from small-field silent VOLE in the Minicrypt model
Cites work
- A Framework for Efficient and Composable Oblivious Transfer
- A new approach to practical active-secure two-party computation
- Founding Cryptography on Oblivious Transfer – Efficiently
- Improved OT extension for transferring short secrets
- Practical covertly secure MPC for dishonest majority -- or: breaking the SPDZ limits
Cited in
(35)- Binary AMD circuits from secure multiparty computation
- More efficient oblivious transfer extensions
- Efficient and round-optimal oblivious transfer and commitment with adaptive security
- PrORAM
- The simplest protocol for oblivious transfer
- On the round complexity of OT extension
- Manticore: a framework for efficient multiparty computation supporting real number and Boolean arithmetic
- Two-round MPC: information-theoretic and black-box
- Making private function evaluation safer, faster, and simpler
- Efficient, actively secure MPC with a dishonest majority: a survey
- Extending oblivious transfer efficiently or -- how to get active security with constant cryptographic overhead
- Blazing fast OT for three-round UC OT extension
- The hardness of LPN over any integer ring and field for PCG applications
- Actively secure garbled circuits with constant communication overhead in the plain model
- Batching base oblivious transfers
- Better security-efficiency trade-offs in permutation-based two-party computation
- On the complexity of additively homomorphic UC commitments
- An efficient structural attack on NIST submission DAGS
- New proof systems and an OPRF from CSIDH
- Actively secure setup for SPDZ
- Efficient constant-round MPC with identifiable abort and public verifiability
- Concretely efficient large-scale MPC with active security (or tinykeys for tinyot)
- Attaining GOD beyond honest majority with friends and foes
- Oblivious transfer with constant computational overhead
- Reverse firewalls for oblivious transfer extension and applications to zero-knowledge
- Actively secure OT-extension from \(q\)-ary linear codes
- Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes
- Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model
- Multiparty generation of an RSA modulus
- Non-interactive secure 2PC in the offline/online and batch settings
- Round-optimal oblivious transfer and MPC from computational CSIDH
- Actively secure 1-out-of-\(N\) OT extension with application to private set intersection
- SoftSpokenOT: quieter OT extension from small-field silent VOLE in the Minicrypt model
- \textsf{ReSolveD}: shorter signatures from regular syndrome decoding and VOLE-in-the-head
- Improved private set intersection against malicious adversaries
This page was built for publication: Actively secure OT extension with optimal overhead
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3457136)