A Framework for Efficient and Composable Oblivious Transfer

From MaRDI portal
Publication:3600240

DOI10.1007/978-3-540-85174-5_31zbMath1183.94046OpenAlexW2167236842MaRDI QIDQ3600240

Chris Peikert, Vinod Vaikuntanathan, Brent Waters

Publication date: 10 February 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-85174-5_31




Related Items (only showing first 100 items - show all)

Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic EncryptionRound-Optimal Black-Box Two-Party ComputationActively Secure OT Extension with Optimal OverheadTwo-Round Oblivious Linear Evaluation from Learning with ErrorsActively secure arithmetic computation and VOLE with constant computational overheadCredibility in private set membershipRound-optimal oblivious transfer and MPC from computational CSIDHOblivious message retrievalSuccinct classical verification of quantum computationPassword-authenticated key exchange from group actionsZero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoorsLattice-based signatures with tight adaptive corruptions and moreRound-optimal black-box secure computation from two-round malicious OTClassically verifiable NIZK for QMA with preprocessingKnowledge encryption and its applications to simulatable protocols with low round-complexityReverse firewalls for oblivious transfer extension and applications to zero-knowledgeHow to compress encrypted dataTwo-round adaptively secure MPC from isogenies, LPN, or CDHA new framework for quantum oblivious transferQuantum search-to-decision reduction for the LWE problemSecurity-preserving distributed samplers: how to generate any CRS in one round without random oraclesOn concurrent multi-party quantum computationHardness of (M)LWE with semi-uniform seedsPacked Ciphertexts in LWE-Based Homomorphic EncryptionEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSActively secure garbled circuits with constant communication overhead in the plain modelRemoving Erasures with Explainable Hash Proof SystemsCryptographic Functions from Worst-Case Complexity AssumptionsUniversally Composable Adaptive Oblivious TransferMulti-theorem preprocessing NIZKs from latticesOn perfectly secure 2PC in the OT-hybrid modelOn perfectly secure 2PC in the OT-hybrid modelAdaptive oblivious transfer with access control from lattice assumptionsPossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningEfficient Oblivious Transfer from Lossy Threshold Homomorphic EncryptionConstructing Universally Composable Oblivious Transfers from Double Trap-Door EncryptionsThreshold Decryption and Zero-Knowledge Proofs for Lattice-Based CryptosystemsPublic-Key Encryption Schemes with Auxiliary InputsPublic-Key Cryptographic Primitives Provably as Secure as Subset SumRound Optimal Universally Composable Oblivious Transfer ProtocolsHow to Simulate It – A Tutorial on the Simulation Proof TechniqueLattice-Based SNARGs and Their Application to More Efficient ObfuscationNon-interactive Secure 2PC in the Offline/Online and Batch SettingsOn the round complexity of secure quantum computationLattice-based key exchange on small integer solution problemThree-round secure multiparty computation from black-box two-round oblivious transferCounterexamples to new circular security assumptions underlying iOPolly cracker, revisitedTwo-round MPC: information-theoretic and black-boxTwo-round adaptively secure multiparty computation from standard assumptionsTwo-message statistically sender-private OT from LWE3-Message Zero Knowledge Against Human IgnoranceApproximate-Deterministic Public Key Encryption from Hard Learning ProblemsStandard Security Does Not Imply Indistinguishability Under Selective OpeningPublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsMore efficient amortization of exact zero-knowledge proofs for LWESurvey of information securityFaster Gaussian sampling for trapdoor lattices with arbitrary modulusAn improved affine equivalence algorithm for random permutationsOptimal forgeries against polynomial-based MACs and GCMEverlasting UC commitments from fully malicious PUFsFully leakage-resilient signaturesSecure Statistical Analysis Using RLWE-Based Homomorphic EncryptionLogarithmic-size ring signatures with tight security from the DDH assumptionRound-optimal black-box protocol compilersAsymptotically quasi-optimal cryptographySecure multiparty computation with free branchingPractical non-interactive publicly verifiable secret sharing with thousands of partiesToward non-interactive zero-knowledge proofs for NP from LWELattice trapdoors and IBE from middle-product LWEA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementFrom FE combiners to secure MPC and backOn the complexity of collision resistant hash functions: new and old black-box separationsChannels of small log-ratio leakage and characterization of two-party differentially private computationLeveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzlesCompressible FHE with applications to PIRMore efficient oblivious transfer extensionsOblivious Transfer from Weakly Random Self-Reducible Public-Key CryptosystemThe Simplest Protocol for Oblivious TransferSecure two-party computation via cut-and-choose oblivious transferBonsai trees, or how to delegate a lattice basisA Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of EquationsGeneralizing Efficient Multiparty ComputationWeakening the Isolation Assumption of Tamper-Proof Hardware TokensAugmented Learning with Errors: The Untapped Potential of the Error TermBreaking the decisional Diffie-Hellman problem for class group actions using genus theory: extended versionAdaptive Oblivious Transfer and GeneralizationStructure-Preserving Smooth Projective HashingPrivacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attackOn the exact round complexity of best-of-both-worlds multi-party computationEfficient and round-optimal oblivious transfer and commitment with adaptive securitySimpler statistically sender private oblivious transfer from ideals of cyclotomic integersCryptographic group actions and applicationsEfficient set operations in the presence of malicious adversariesSuccinct LWE sampling, random polynomials, and obfuscationOblivious transfer from trapdoor permutations in minimal roundsAmortizing rate-1 OT and applications to PIR and PSIDirect computation of branching programs and its applications to more efficient lattice-based cryptographyActively Secure 1-out-of-N OT Extension with Application to Private Set IntersectionMulti-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -Based




This page was built for publication: A Framework for Efficient and Composable Oblivious Transfer