Oblivious Transfer Is Symmetric
From MaRDI portal
Publication:3593098
DOI10.1007/11761679_14zbMath1140.94372OpenAlexW1551076855MaRDI QIDQ3593098
Jürg Wullschleger, Stefan Wolf
Publication date: 24 September 2007
Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11761679_14
Related Items (25)
One-way functions imply secure computation in a quantum world ⋮ Oblivious transfer and quantum channels as communication resources ⋮ Secure computation using leaky correlations (asymptotically optimal constructions) ⋮ More efficient DDH pseudorandom generators ⋮ Efficient Zero-Knowledge Proofs of Non-algebraic Statements with Sublinear Amortized Cost ⋮ Asymptotically quasi-optimal cryptography ⋮ On the feasibility of extending oblivious transfer ⋮ Statistical security in two-party computation revisited ⋮ Secure non-interactive simulation from arbitrary joint distributions ⋮ General properties of quantum bit commitments (extended abstract) ⋮ On perfectly secure two-party computation for symmetric functionalities with correlated randomness ⋮ Error-Tolerant Combiners for Oblivious Primitives ⋮ Efficient one-sided adaptively secure computation ⋮ On Oblivious Transfer Capacity ⋮ Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs ⋮ Information-Theoretic Conditions for Two-Party Secure Function Evaluation ⋮ On the power of non-local boxes ⋮ Cryptography and Game Theory: Designing Protocols for Exchanging Information ⋮ Adaptively Secure Two-Party Computation with Erasures ⋮ On perfectly secure 2PC in the OT-hybrid model ⋮ On perfectly secure 2PC in the OT-hybrid model ⋮ Statistical Zaps and new oblivious transfer protocols ⋮ Network Oblivious Transfer ⋮ Finding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments ⋮ Oblivious transfer based on single-qubit rotations
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A Mathematical Theory of Communication
- Oblivious transfer and privacy amplification
- Oblivious transfer and polynomial evaluation
- A new outlook on Shannon's information measures
- On the Reversibility of Oblivious Transfer
- The Wire-Tap Channel
- Foundations of Cryptography
- Cryptography and Coding
- New Monotones and Lower Bounds in Unconditional Two-Party Computation
- Security in Communication Networks
This page was built for publication: Oblivious Transfer Is Symmetric