Back to Results
First PageMeta Content
Ciphertext indistinguishability / Oblivious transfer / Computational indistinguishability / Cryptographic hash function / Chosen-ciphertext attack / Zero-knowledge proof / Diffie–Hellman problem / RSA / Cryptography / Cryptographic protocols / Common reference string model


Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi∗ Jonathan Katz†
Add to Reading List

Document Date: 2014-05-14 14:54:31


Open Document

File Size: 586,09 KB

Share Result on Facebook

City

A.1 DDH / /

Company

NBC / Smooth Projective Hash Proof Systems We / Smooth Projective Hash Proof Systems / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

George Washington University / Virginia Commonwealth University / Columbia University / University of Maryland / /

IndustryTerm

oblivious-transfer protocols / generation algorithm / zero-knowledge protocols / public-coin protocol / composable protocols / Σ-protocol / decryption algorithm / polynomial-time algorithm / multiparty computation protocols / verifier algorithm / constant-round protocol / secure protocol / coin-tossing protocol / round-optimal protocols / encryption algorithm / pre-processing / honest-verifier zero-knowledge protocol / /

MusicGroup

Pi / /

Organization

Columbia University / National Science Foundation / University of Maryland / U.S. Government / Virginia Commonwealth University / U.S. Securities and Exchange Commission / George Washington University / /

Person

Hong-Sheng Zhou§ May / Jonathan Katz† Hoeteck Wee / Seung Geol Choi∗ Jonathan / /

/

Position

author / /

Product

Groth-Sahai / UC / Lin11 / Peikert / PVW08 / FLM11 / HK07 / GMY04 / JS07 / /

ProvinceOrState

Maryland / /

Technology

three algorithms / randomized algorithm / underlying OT protocol / CCA-Secure Encryption / The encryption algorithm / 3-round honest-verifier zero-knowledge protocol / following PPT algorithms / two-round protocols / input using CCA-secure encryption / zero-knowledge protocols / universally composable protocols / secret key / three-round public-coin protocol / The decryption algorithm / three PPT algorithms / The key generation algorithm / 4-round protocols / verifier algorithm / non-uniform PPT algorithms / Encryption / oblivious-transfer protocols / 6 38 Protocol / four-round OT protocols / constant-round protocol / adaptively secure protocol / public key / four-round protocol / public-key encryption / OT protocol / polynomial-time algorithm / CRS generation algorithm / 2.4 Labeled CCA-Secure Encryption / 3-round protocols / multiparty computation protocols / simulation / coin-tossing protocol / OT protocols / 2.5 Σ-Protocols / /

SocialTag