Generalized oblivious transfer by secret sharing
From MaRDI portal
Publication:629875
DOI10.1007/s10623-010-9378-8zbMath1220.94051MaRDI QIDQ629875
Publication date: 10 March 2011
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-010-9378-8
secret sharing; oblivious transfer; multiparty computation; access structures; generalized oblivious transfer
Related Items
Construction of arithmetic secret sharing schemes by using torsion limits, ACE with Compact Ciphertext Size and Decentralized Sanitizers, Secret-sharing schemes for very dense graphs, A note on ``Selling multiple secrets to a single buyer, Restricted adaptive oblivious transfer, ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls, Constructing ideal secret sharing schemes based on Chinese remainder theorem, Upslices, downslices, and secret-sharing with complexity of \(1.5^n\), A group identification protocol with leakage resilience of secret sharing scheme, Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification, Secret Sharing Schemes for Dense Forbidden Graphs, Generalizing Efficient Multiparty Computation, Secret-Sharing Schemes: A Survey
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Hierarchical threshold secret sharing
- Computationally secure oblivious transfer
- Oblivious transfers and intersecting codes
- Characterizing Ideal Weighted Threshold Secret Sharing
- On the Optimization of Bipartite Secret Sharing Schemes
- Alternative Protocols for Generalized Oblivious Transfer
- Oblivious Polynomial Evaluation