Resource-efficient OT combiners with active security
From MaRDI portal
Recommendations
Cited in
(7)- On Robust Combiners for Private Information Retrieval and Other Primitives
- Three-round secure multiparty computation from black-box two-round oblivious transfer
- Secure computation using leaky correlations (asymptotically optimal constructions)
- OT-Combiners via Secure Computation
- Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages
- Robuster Combiners for Oblivious Transfer
- On Robust Combiners for Oblivious Transfer and Other Primitives
This page was built for publication: Resource-efficient OT combiners with active security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1690281)