First Page | Document Content | |
---|---|---|
![]() Date: 2014-09-16 07:30:08Secure two-party computation Zero-knowledge proof Commitment scheme Oblivious transfer Computational indistinguishability Oded Goldreich Ciphertext indistinguishability Man-in-the-middle attack Cryptography Cryptographic protocols Secure multi-party computation | Add to Reading List |
![]() | On the Feasibility of Extending Oblivious Transfer∗ Yehuda Lindell Hila Zarosim Dept. of Computer ScienceDocID: 1v80m - View Document |
![]() | Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer∗ Yehuda Lindell Hila ZarosimDocID: 1uUpb - View Document |
![]() | INFOCOMMUNICATIONS JOURNAL Oblivious Transfer with Verification Oblivious ObliviousDocID: 1uO7u - View Document |
![]() | Chemical OT: On the (Im)possibility of Basing Oblivious Transfer on Chemical Assump>ons Bernardo DavidDocID: 1tRD2 - View Document |
![]() | Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer∗ Yehuda Lindell† Benny Pinkas‡DocID: 1tjPL - View Document |