Robuster Combiners for Oblivious Transfer
From MaRDI portal
Publication:3596394
DOI10.1007/978-3-540-70936-7_22zbMath1129.94031OpenAlexW2143222367MaRDI QIDQ3596394
Bartosz Przydatek, Remo Meier, Jürg Wullschleger
Publication date: 30 August 2007
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70936-7_22
Related Items (12)
Oblivious transfer in incomplete networks ⋮ Secure computation using leaky correlations (asymptotically optimal constructions) ⋮ Secure Computation from Leaky Correlated Randomness ⋮ One-time programs from commodity hardware ⋮ Error-Tolerant Combiners for Oblivious Primitives ⋮ Compression from Collisions, or Why CRHF Combiners Have a Long Output ⋮ OT-Combiners via Secure Computation ⋮ Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages ⋮ Network Oblivious Transfer ⋮ Obfuscation Combiners ⋮ Authenticated Byzantine Generals in Dual Failure Model ⋮ Amplifying the security of functional encryption, unconditionally
This page was built for publication: Robuster Combiners for Oblivious Transfer