Oblivious-Transfer Amplification
From MaRDI portal
Publication:5429412
DOI10.1007/978-3-540-72540-4_32zbMath1141.94380OpenAlexW2123025883MaRDI QIDQ5429412
Publication date: 29 November 2007
Published in: Advances in Cryptology - EUROCRYPT 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-72540-4_32
weak oblivious transferuniversal oblivious transfercomputational weak oblivious transferdistributed leftover hash lemmahard-core lemmaoblivious-transfer amplification
Related Items (15)
Oblivious transfer in incomplete networks ⋮ Simultaneous Secrecy and Reliability Amplification for a General Channel Model ⋮ Cryptography with One-Way Communication ⋮ Channels of small log-ratio leakage and characterization of two-party differentially private computation ⋮ A tight computational indistinguishability bound for product distributions ⋮ Error-Tolerant Combiners for Oblivious Primitives ⋮ Composable Security in the Bounded-Quantum-Storage Model ⋮ Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols ⋮ Everlasting multi-party computation ⋮ OT-Combiners via Secure Computation ⋮ Degradation and Amplification of Computational Hardness ⋮ Secure Two-Party Computation over a Z-Channel ⋮ Network Oblivious Transfer ⋮ Statistical Security Conditions for Two-Party Secure Function Evaluation ⋮ Amplifying the security of functional encryption, unconditionally
This page was built for publication: Oblivious-Transfer Amplification