Weak Oblivious Transfer from Strong One-Way Functions
From MaRDI portal
Publication:3092347
DOI10.1007/978-3-642-24316-5_5zbMath1298.94106OpenAlexW1517880624MaRDI QIDQ3092347
Keisuke Tanaka, Kenji Yasunaga, Akihiro Yamada
Publication date: 16 September 2011
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-24316-5_5
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Secure communications over insecure channels
- Black-box constructions for secure computation
- Information-Theoretic Interactive Hashing and Oblivious Transfer to a Storage-Bounded Receiver
- On Yao’s XOR-Lemma
- Merkle Puzzles Are Optimal — An O(n2)-Query Attack on Any Key Exchange from a Random Oracle
- Foundations of Cryptography
- An Almost m-wise Independent Random Permutation of the Cube
- Basing Weak Public-Key Cryptography on Strong One-Way Functions
- Semi-honest to Malicious Oblivious Transfer—The Black-Box Way
- Enumerative source encoding
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: Weak Oblivious Transfer from Strong One-Way Functions