We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware tokens for universally composable secure computation. As our main result, we show an oblivious-transfer (OT) protocol in which two parties each create and transfer a single, stateless token and can then run an unbounded number of OTs. We also show a more efficient protocol, based only on standard symmetric-key primitives (block ciphers and collision-resistant hash functions), that can be used if a bounded number of OTs suffice. Motivated by this result, we investigate the number of stateless tokens needed for universally composable OT. We prove that our protocol is optimal in this regard for constructions making black-box use of the tokens (in a s...
Abstract. We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable s...
We present a general framework for efficient, universally composable oblivious transfer (OT) protoco...
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper ...
Abstract We continue the line of work initiated by Katz (Eurocrypt 2007) on using tam...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for u...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
In this paper, a universally composable 1-out-of-N oblivious transfer protocol with low communicatio...
Abstract. Due to its universality oblivious transfer (OT) is a primitive of great importance in secu...
Abstract. SFE requires expensive public key operations for each input bit of the function. This cost...
Abstract. SFE requires expensive public key operations for each input bit of the function. This cost...
Abstract. We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable s...
We present a general framework for efficient, universally composable oblivious transfer (OT) protoco...
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper ...
Abstract We continue the line of work initiated by Katz (Eurocrypt 2007) on using tam...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for u...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
We revisit the problem of universally composable (UC) secure multiparty computation in the stateless...
In this paper, a universally composable 1-out-of-N oblivious transfer protocol with low communicatio...
Abstract. Due to its universality oblivious transfer (OT) is a primitive of great importance in secu...
Abstract. SFE requires expensive public key operations for each input bit of the function. This cost...
Abstract. SFE requires expensive public key operations for each input bit of the function. This cost...
Abstract. We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable s...
We present a general framework for efficient, universally composable oblivious transfer (OT) protoco...
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper ...