We consider the problem of basing Oblivious Transfer (OT)and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives.We introduce a general model for describing such primitives, called Weak Generic Transfer (WGT). This model includes as important special cases Weak Oblivious Transfer (WOT), where boththe sender and receiver may learn too much about the other party's input, and a new, more realistic model of noisy channels, called unfair noisy channels. An unfair noisy channel has a known range of possible noise levels; protocols must work for any level within this range against adversaries who know the actual noise level. We give a precise characterization for when one can base OT on WOT. When the deviation ...
In this paper, we deal with the task of obtaining oblivious transfer (OT) from noisy resources. We c...
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic s...
Historically, cryptography was created and used to deliver messages between people in such a way tha...
In a paper from EuroCrypt'99, Damgård, Kilian and Salvail show various positive and negative results...
In the bounded storage model the memory of the adversary is restricted, instead of its computational...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
Noisy channels are a valuable resource from a cryptographic point of view. They can be used for exch...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
Oblivious transfer is one of the most important cryptographic primitive. An un- fair weak version of...
Oblivious transfer (OT) is a powerful primitive in modern cryptography, often used in a context of s...
Without the use of computational assumptions, unconditionally secure oblivious transfer (OT) is impo...
In secure two-party computation, two mutually distrusting parties are interested in jointly computin...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
We present a new and very simple commitment scheme that does not depend on any assumptions about com...
In this paper, we deal with the task of obtaining oblivious transfer (OT) from noisy resources. We c...
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic s...
Historically, cryptography was created and used to deliver messages between people in such a way tha...
In a paper from EuroCrypt'99, Damgård, Kilian and Salvail show various positive and negative results...
In the bounded storage model the memory of the adversary is restricted, instead of its computational...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
Noisy channels are a valuable resource from a cryptographic point of view. They can be used for exch...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
Oblivious transfer is one of the most important cryptographic primitive. An un- fair weak version of...
Oblivious transfer (OT) is a powerful primitive in modern cryptography, often used in a context of s...
Without the use of computational assumptions, unconditionally secure oblivious transfer (OT) is impo...
In secure two-party computation, two mutually distrusting parties are interested in jointly computin...
Abstract. Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-tw...
We present a new and very simple commitment scheme that does not depend on any assumptions about com...
In this paper, we deal with the task of obtaining oblivious transfer (OT) from noisy resources. We c...
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic s...
Historically, cryptography was created and used to deliver messages between people in such a way tha...