We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for universally composable secure computation. As our main result, we show an efficient oblivious-transfer (OT) protocol in which two parties each create and exchange a single, stateless token and can then run an unbounded number of OTs. Our result yields what we believe is the most practical and efficient known approach for oblivious transfer based on tamper-proof tokens, and implies that the parties can perform (repeated) secure computation of arbitrary functions without exchanging additional tokens. Motivated by this result, we investigate the minimal number of stateless tokens needed for universally composable OT / secure computation. We prove...
In a seminal work, Katz (Eurocrypt 2007) showed that parties being able to issue tamper-proof hardwa...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
Abstract. We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable s...
Abstract We continue the line of work initiated by Katz (Eurocrypt 2007) on using tam...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware token...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
In this paper, a universally composable 1-out-of-N oblivious transfer protocol with low communicatio...
Abstract. SFE requires expensive public key operations for each input bit of the function. This cost...
Abstract. SFE requires expensive public key operations for each input bit of the function. This cost...
Abstract. Due to its universality oblivious transfer (OT) is a primitive of great importance in secu...
In a seminal work, Katz (Eurocrypt 2007) showed that parties being able to issue tamper-proof hardwa...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
Abstract. We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable s...
Abstract We continue the line of work initiated by Katz (Eurocrypt 2007) on using tam...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware token...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
In this paper, a universally composable 1-out-of-N oblivious transfer protocol with low communicatio...
Abstract. SFE requires expensive public key operations for each input bit of the function. This cost...
Abstract. SFE requires expensive public key operations for each input bit of the function. This cost...
Abstract. Due to its universality oblivious transfer (OT) is a primitive of great importance in secu...
In a seminal work, Katz (Eurocrypt 2007) showed that parties being able to issue tamper-proof hardwa...
Naor and Pinkas (1999a) pointed out that 'this is of interest, given the possibility of implementing...
Abstract. We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable s...