Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer - MaRDI portal

Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer

From MaRDI portal
Publication:3000547

DOI10.1007/978-3-642-19571-6_20zbMath1281.94037OpenAlexW2119180312MaRDI QIDQ3000547

Yehuda Lindell, Benny Pinkas

Publication date: 19 May 2011

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_20




Related Items (26)

Automata evaluation and text search protocols with simulation-based securityFast cut-and-choose-based protocols for malicious and covert adversariesConstant-Round Maliciously Secure Two-Party Computation in the RAM ModelMore Efficient Constant-Round Multi-party Computation from BMR and SHEImplicit Zero-Knowledge Arguments and Applications to the Malicious SettingMore efficient oblivious transfer extensionsGeneralizing Efficient Multiparty ComputationHow to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling SchemesHigh-throughput secure three-party computation with an honest majorityEfficient RSA key generation and threshold Paillier in the two-party settingPrivacy-enhanced attribute-based private information retrievalEfficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication costFast large-scale honest-majority MPC for malicious adversariesOblivious polynomial evaluation and secure set-intersection from algebraic PRFsEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSHigh-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest MajorityConstant-round maliciously secure two-party computation in the RAM modelSecure extended wildcard pattern matching protocol from cut-and-choose oblivious transferOn the Complexity of Additively Homomorphic UC CommitmentsHigh-performance multi-party computation for binary circuits based on oblivious transferLow cost constant round MPC combining BMR and oblivious transferComputationally secure pattern matching in the presence of malicious adversariesEncryption Switching ProtocolsFaster Secure Two-Party Computation in the Single-Execution SettingHashing Garbled Circuits for FreeOblivious transfer based on single-qubit rotations






This page was built for publication: Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer