Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Abstract: We introduce the first efficient fully simulatable construction of oblivious transfer based on the McEliece assumptions in the common reference ...
We introduce the first efficient fully simulatable construction of oblivious transfer based on the McEliece assumptions in the common reference string model.
Abstract. We implement one-out-of-two bit oblivious transfer (OT) based on the assump- tions used in the McEliece cryptosystem: the hardness of decoding ...
Abstract. We introduce a general construction of fully simulatable oblivious transfer based on lossy encryption. Furthermore, we extend the common def-.
PDF | We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliece cryptosystem: the hardness of decoding.
Missing: Fully | Show results with:Fully
[29] shows how to construct 4 round fully simulatable OT from key agreement protocols with certain properties without requiring setup assumptions, which yields ...
David, B.M., Nascimento, A.C.A.: Efficient fully simulatable oblivious transfer from the mceliece assumptions. In: Information Theory Workshop (ITW), pp ...
Nov 11, 2012 · SUMMARY. We introduce an efficient fully simulatable construction of oblivious transfer based on the McEliece assumptions in the common.
Bibliographic details on Efficient Fully Simulatable Oblivious Transfer from the McEliece Assumptions.
Universally composable oblivious transfer from lossy encryption and the mceliece assumptions. ... Efficient fully-simulatable oblivious transfer. In Tal Malkin, ...