Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Jan 14, 2022 · We present an information-theoretic transformation from any 2-round OT protocol with only game-based security in the presence of malicious adversaries into a 4 ...
An information-theoretic transformation from any 2-round OT protocol into a 4-round (which is known to be optimal) OT protocol with simulation-based ...
We present an information-theoretic transformation from any 2-round OT protocol with only game- based security in the presence of malicious adversaries into a ...
Jun 30, 2022 · A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement. In Dennis Hofheinz and Alon ...
We present an information-theoretic transformation from any 2-round OT protocol with only game-based security in the presence of malicious adversaries into a 4- ...
Apr 25, 2024 · From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-Theoretic. ITC 2022: 5:1-5:20. [i1]. view. electronic edition @ iacr ...
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic. Varun Madathil and Chris Orsini and Alessandra Scafuro and Daniele ...
Information-Theoretic Cryptography Conference ... From Privacy-Only to Simulatable OT: Black-Box,Round-Optimal, Information-theoretic
Apr 25, 2024 · From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-Theoretic. ITC 2022: 5:1-5:20. [c32]. view. electronic edition via ...