Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Jan 14, 2022 · We present an information-theoretic transformation from any 2-round OT protocol with only game-based security in the presence of malicious ...
An information-theoretic transformation from any 2-round OT protocol into a 4-round (which is known to be optimal) OT protocol with simulation-based ...
We present an information-theoretic transformation from any 2-round OT protocol with only game- based security in the presence of malicious adversaries into a ...
We present an information-theoretic transformation from any 2-round OT protocol with only game-based security in the presence of malicious adversaries into a 4- ...
Apr 25, 2024 · From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-Theoretic. ITC 2022: 5:1-5:20. [i1]. view. electronic edition @ iacr ...
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic. Varun Madathil and Chris Orsini and Alessandra Scafuro and Daniele ...
Information-Theoretic Cryptography Conference ... From Privacy-Only to Simulatable OT: Black-Box,Round-Optimal, Information-theoretic
Apr 25, 2024 · From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-Theoretic. ITC 2022: 5:1-5:20. [c32]. view. electronic edition via ...
Aug 20, 2023 · Our protocol makes black-box use of a sub-exponentially secure two-message statistical sender private oblivious transfer (SSP-OT), which in turn ...
This protocol matches a known round complexity lower bound due to Applebaum et al. (ITCS'20) and is based on a minimal cryptographic hardness assumption. A two- ...