Efficient Fully-Simulatable Oblivious Transfer
From MaRDI portal
Publication:5458932
DOI10.1007/978-3-540-79263-5_4zbMATH Open1153.94406OpenAlexW2171229805MaRDI QIDQ5458932FDOQ5458932
Publication date: 24 April 2008
Published in: Topics in Cryptology – CT-RSA 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-79263-5_4
Recommendations
Cites Work
- Title not available (Why is that?)
- How to construct constant-round zero-knowledge proof systems for NP
- Security and composition of multiparty cryptographic protocols
- Efficient oblivious transfer protocols
- Title not available (Why is that?)
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
- Title not available (Why is that?)
- Title not available (Why is that?)
- Strict Polynomial-Time in Simulation and Extraction
- Foundations of Cryptography
- Probability and Computing
- Pairings for cryptographers
- Advances in Cryptology – CRYPTO 2004
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Simulatable Adaptive Oblivious Transfer
- Advances in Cryptology - EUROCRYPT 2004
- Smooth Projective Hashing and Two-Message Oblivious Transfer
Cited In (15)
- Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions
- Knowledge encryption and its applications to simulatable protocols with low round-complexity
- Round Optimal Universally Composable Oblivious Transfer Protocols
- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
- Fully-Simulatable Oblivious Set Transfer
- Solutions to the anti-piracy problem in oblivious transfer
- Adaptive oblivious transfer with access control from lattice assumptions
- Compact, efficient and UC-secure isogeny-based oblivious transfer
- Efficient oblivious transfer protocols
- ``The simplest protocol for oblivious transfer revisited
- Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols
- Privacy-enhanced attribute-based private information retrieval
- Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost
- Classically verifiable NIZK for QMA with preprocessing
- Universally Composable Adaptive Oblivious Transfer
This page was built for publication: Efficient Fully-Simulatable Oblivious Transfer
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458932)