Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Smooth Projective Hashing and Two-Message Oblivious Transfer - MaRDI portal

Smooth Projective Hashing and Two-Message Oblivious Transfer

From MaRDI portal
Publication:5385723

DOI10.1007/11426639_5zbMath1137.94348OpenAlexW1513096110MaRDI QIDQ5385723

Yael Tauman Kalai

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_5




Related Items (31)

Two-message statistically sender-private OT from LWEA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementChannels of small log-ratio leakage and characterization of two-party differentially private computationAdaptive Oblivious Transfer and GeneralizationStructure-Preserving Smooth Projective HashingAlmost-optimally fair multiparty coin-tossing with nearly three-quarters maliciousRate-1 incompressible encryption from standard assumptionsIn search of mathematical primitives for deriving universal projective hash familiesRound-optimal black-box MPC in the plain modelList oblivious transfer and applications to round-optimal black-box multiparty coin tossingSimpler statistically sender private oblivious transfer from ideals of cyclotomic integersAn Almost-Optimally Fair Three-Party Coin-Flipping ProtocolCommunication-efficient distributed oblivious transferRevisited Experimental Comparison of Node-Link and Matrix RepresentationsImplementing Two-Party Computation Efficiently with Security Against Malicious AdversariesBlind Identity-Based Encryption and Simulatable Oblivious TransferSecurity against covert adversaries: Efficient protocols for realistic adversariesGeneric Construction of UC-Secure Oblivious TransferFine-grained cryptography revisitedEfficient Fully-Simulatable Oblivious TransferA new approach for UC security concurrent deniable authenticationAdaptive oblivious transfer with access control from lattice assumptionsPassword-authenticated group key establishment from smooth projective hash functionsStatistical ZAP argumentsStatistical Zaps and new oblivious transfer protocolsWitness indistinguishability for any single-round argument with applications to access controlConstructing Universally Composable Oblivious Transfers from Double Trap-Door EncryptionsOblivious Transfer Based on the McEliece AssumptionsRound Optimal Universally Composable Oblivious Transfer ProtocolsA gapless code-based hash proof system based on RQC and its applicationsAn efficient protocol for secure two-party computation in the presence of malicious adversaries




This page was built for publication: Smooth Projective Hashing and Two-Message Oblivious Transfer