Publication:3787498
From MaRDI portal
zbMath0644.68077MaRDI QIDQ3787498
Publication date: 1988
oblivious transfer; cryptographic protocol; efficient computing of functions; interacting Turing machines; maximum privacy
Related Items
OT-Combiners via Secure Computation, Counting Method for Multi-party Computation over Non-abelian Groups, Statistical Security Conditions for Two-Party Secure Function Evaluation, Communication-efficient distributed oblivious transfer, Generalized oblivious transfer by secret sharing, Private multiparty sampling and approximation of vector combinations, Oblivious keyword search, Basing cryptographic protocols on tamper-evident seals, A New Efficient Protocol for k-out-of-n Oblivious Transfer, On Complete Primitives for Fairness, Founding Cryptography on Tamper-Proof Hardware Tokens, Improved Garbled Circuit: Free XOR Gates and Applications, Graph Design for Secure Multiparty Computation over Non-Abelian Groups