Efficient committed oblivious transfer of bit strings (original) (raw)

Efficient and Universally Composable Committed Oblivious Transfer and Applications

Juan A. Garay

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Committed Oblivious Transfer and Private Multi-Party Computation

Alain Tapp

Lecture Notes in Computer Science, 1995

View PDFchevron_right

Fast and Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security

Megha Byali

2017

View PDFchevron_right

An Efficient Secure Oblivious Transfer

周志賢 資訊管理學系-

View PDFchevron_right

Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security

Pratik Sarkar

Advances in Cryptology – ASIACRYPT 2020, 2020

View PDFchevron_right

Efficient Two-Party Secure Computation on Committed Inputs

Stanislaw Jarecki

Lecture Notes in Computer Science, 2007

View PDFchevron_right

Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer

Ziya Alper Genç, Mehmet Sabir Kiraz

View PDFchevron_right

Weakening Security Assumptions and Oblivious Transfer (Abstract)

Claude Crépeau

International Cryptology Conference, 1988

View PDFchevron_right

Concurrent oblivious transfer

Juan A. Garay

Proceedings 41st Annual Symposium on Foundations of Computer Science

View PDFchevron_right

Protocols for Authenticated Oblivious Transfer

Mehrad Jaberi

IACR Cryptol. ePrint Arch., 2016

View PDFchevron_right

Extending Oblivious Transfers Efficiently

Kobbi Nissim

Lecture Notes in Computer Science, 2003

View PDFchevron_right

(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens

Seung Choi

Theory of Cryptography, 2014

View PDFchevron_right

Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise

Abhishek Jain

Lecture Notes in Computer Science, 2012

View PDFchevron_right

Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation

Hideki Imai

Lecture Notes in Computer Science, 2009

View PDFchevron_right

Weakening Security Assumptions and Oblivious Transfer

Claude Crépeau

Lecture Notes in Computer Science

View PDFchevron_right

Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems

Abhishek Jain

View PDFchevron_right

Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer

Hong-Sheng Zhou

Lecture Notes in Computer Science, 2009

View PDFchevron_right

Verifiable Disclosure of Secrets and Applications (Abstract)

Claude Crépeau

Lecture Notes in Computer Science

View PDFchevron_right

Efficient oblivious transfers with access control

Willy Susilo

Computers & Mathematics with Applications, 2012

View PDFchevron_right

Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution

David Evans

2012

View PDFchevron_right

On The Efficiency of Bit Commitment Reductions

samuel ranellucci

View PDFchevron_right

Linear zero-knowledge---a note on efficient zero-knowledge proofs and arguments

Ivan Damgård

Proceedings of the twenty-ninth annual ACM symposium on Theory of computing - STOC '97, 1997

View PDFchevron_right

Optimal Reductions Between Oblivious Transfers Using Interactive Hashing

Claude Crépeau

Lecture Notes in Computer Science, 2006

View PDFchevron_right

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM

Kirill Morozov

2017

View PDFchevron_right

Improved Non-committing Encryption with Applications to Adaptively Secure Protocols

Dana Dachman-soled

Lecture Notes in Computer Science, 2009

View PDFchevron_right

Information-Theoretically Secure String Commitments Based on Packet Reordering Channels

Vinicius de Morais Alves

IEEE Access

View PDFchevron_right

A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols

Ninghui Li

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Efficient computational oblivious transfer using interactive hashing

Kirill Morozov

Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11, 2011

View PDFchevron_right

Bulletproofs: Short Proofs for Confidential Transactions and More

Benedikt Bünz

2018 IEEE Symposium on Security and Privacy (SP), 2018

View PDFchevron_right

A New Approach to Practical Active-Secure Two-Party Computation

sai bura

Lecture Notes in Computer Science, 2012

View PDFchevron_right

Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography

Vipul Goyal

View PDFchevron_right

Generalized Oblivious Transfer Protocols Based on Noisy Channels

Kirill Morozov

Lecture Notes in Computer Science, 2001

View PDFchevron_right

Zero-Knowledge Proofs from Secure Multiparty Computation

Amit Sahai

SIAM Journal on Computing, 2009

View PDFchevron_right