Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification
From MaRDI portal
Publication:5502802
Recommendations
Cites work
- scientific article; zbMATH DE number 1303135 (Why is no real title available?)
- scientific article; zbMATH DE number 1418314 (Why is no real title available?)
- A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer Reductions
- All-or-nothing encryption and the package transform
- Almost \(k\)-wise independent sample spaces and their cryptologic applications
- Deterministic Extractors for Bit‐Fixing Sources and Exposure‐Resilient Cryptography
- Deterministic Extractors for Bit‐Fixing Sources by Obtaining an Independent Seed
- Deterministic Extractors for Independent-Symbol Sources
- Exposure-resilient functions and all-or-nothing transforms
- Generalized privacy amplification
- Information-Theoretic Conditions for Two-Party Secure Function Evaluation
- Lower Bounds for Oblivious Transfer Reductions
- New Monotones and Lower Bounds in Unconditional Two-Party Computation
- Oblivious Transfer and Linear Functions
- Oblivious transfer and privacy amplification
- Oblivious transfers and intersecting codes
- Privacy Amplification by Public Discussion
- Probability Inequalities for Sums of Bounded Random Variables
- Simple Constructions of Almost k-wise Independent Random Variables
This page was built for publication: Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5502802)