Smooth projective hashing and two-message oblivious transfer

From MaRDI portal
Publication:421036

DOI10.1007/s00145-010-9092-8zbMath1272.94033OpenAlexW1979280691MaRDI QIDQ421036

Shai Halevi, Yael Tauman Kalai

Publication date: 23 May 2012

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-010-9092-8




Related Items

Three-round secure multiparty computation from black-box two-round oblivious transferTwo-round adaptively secure multiparty computation from standard assumptionsTwo-message statistically sender-private OT from LWE3-Message Zero Knowledge Against Human IgnoranceAn improved affine equivalence algorithm for random permutationsA New General Framework for Secure Public Key Encryption with Keyword SearchStrong authenticated key exchange with auxiliary inputsAlgebraic restriction codes and their applicationsStatistical security in two-party computation revisitedCryptographic Reverse Firewall via Malleable Smooth Projective Hash FunctionsKnowledge encryption and its applications to simulatable protocols with low round-complexityTwo-round adaptively secure MPC from isogenies, LPN, or CDHStatistically sender-private OT from LPN and derandomizationA new framework for quantum oblivious transferRound-optimal black-box MPC in the plain modelA framework for statistically sender private OT with optimal rateSimpler statistically sender private oblivious transfer from ideals of cyclotomic integersCryptographic group actions and applicationsAmortizing rate-1 OT and applications to PIR and PSIRevisited Experimental Comparison of Node-Link and Matrix RepresentationsEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSCryptography Using Captcha PuzzlesCircuit-Private Multi-key FHEWhat security can we achieve within 4 rounds?One-Round Strong Oblivious Signature-Based EnvelopeStatistical ZAPR arguments from bilinear mapsStatistical ZAP argumentsStatistical Zaps and new oblivious transfer protocolsRound-optimal blind signatures in the plain model from classical and quantum standard assumptionsBETA: biometric-enabled threshold authenticationWhat Security Can We Achieve Within 4 Rounds?On the Existence of Extractable One-Way FunctionsTwo-Message, Oblivious Evaluation of Cryptographic FunctionalitiesOn black-box complexity of universally composable security in the CRS modelPublic key encryption with equality test via hash proof systemA gapless code-based hash proof system based on RQC and its applicationsWeak Zero-Knowledge beyond the Black-Box BarrierThe price of active security in cryptographic protocolsSuccinct non-interactive secure computationTwo-round oblivious transfer from CDH or LPN



Cites Work


This page was built for publication: Smooth projective hashing and two-message oblivious transfer