Equational security proofs of oblivious transfer protocols
From MaRDI portal
Publication:1749300
DOI10.1007/978-3-319-76578-5_18zbMath1439.94040OpenAlexW2576620499MaRDI QIDQ1749300
Publication date: 16 May 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-76578-5_18
Related Items (7)
Formal analysis of symbolic authenticity ⋮ Compactness vs Collusion Resistance in Functional Encryption ⋮ Local XOR unification: definitions, algorithms and application to cryptography ⋮ Endemic oblivious transfer via random oracles, revisited ⋮ Efficient and round-optimal oblivious transfer and commitment with adaptive security ⋮ Blazing fast OT for three-round UC OT extension ⋮ ``The simplest protocol for oblivious transfer revisited
This page was built for publication: Equational security proofs of oblivious transfer protocols