Oblivious polynomial evaluation (OPE) is a two-party protocol that allows a receiver, R to learn an evaluation f(alpha), of a sender, S's polynomial (f(x)), whilst keeping both ff and f(x) private. This protocol has attracted a lot of attention recently, as it has wide ranging applications in the field of cryptography. In this article we review some of these applications and, additionally, take an in-depth look at the special case of information theoretic OPE. Specifically, we provide a current and critical review of the existing information theoretic OPE protocols in the literature. We divide these protocols into two distinct cases (three-party and distributed OPE) allowing for the easy distinction and classification of future information ...
International audienceOblivious Polynomial Evaluation (OPE) schemes are interactive protocols betwee...
In an unconditionally secure Distributed Oblivious Transfer (DOT) protocol, a receiver contacts at l...
We consider oblivious transfer protocols and their applications that use underneath semantically sec...
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polyn...
Oblivious polynomial evaluation (OPE) was first introduced by Naor and Pinkas in 1999. An OPE proto...
Abstract—Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input i...
International audiencen this paper, we propose a protocol for Oblivious Polynomial Evaluation (OPE) ...
Part 3: CryptographyInternational audienceIt is a challenging problem to delegate the computation of...
Vanishree et.al proposed a novel unconditionally oblivious polynomial evaluation protocol and they c...
In this paper we study the two fundamental functionalities oblivious polynomial evaluation in the ex...
International audienceDelegating the computation of a polynomial to a server in a verifiable way is ...
AbstractWe study the problem of oblivious polynomial evaluation (OPE). There are two parties, Alice ...
We study the problem of Oblivious Polynomial Evaluation (OPE), where one party has a polynomial P & ...
Private Polynomial Evaluation (PPE) allows the service provider to outsource the computation of a po...
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an eval...
International audienceOblivious Polynomial Evaluation (OPE) schemes are interactive protocols betwee...
In an unconditionally secure Distributed Oblivious Transfer (DOT) protocol, a receiver contacts at l...
We consider oblivious transfer protocols and their applications that use underneath semantically sec...
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polyn...
Oblivious polynomial evaluation (OPE) was first introduced by Naor and Pinkas in 1999. An OPE proto...
Abstract—Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input i...
International audiencen this paper, we propose a protocol for Oblivious Polynomial Evaluation (OPE) ...
Part 3: CryptographyInternational audienceIt is a challenging problem to delegate the computation of...
Vanishree et.al proposed a novel unconditionally oblivious polynomial evaluation protocol and they c...
In this paper we study the two fundamental functionalities oblivious polynomial evaluation in the ex...
International audienceDelegating the computation of a polynomial to a server in a verifiable way is ...
AbstractWe study the problem of oblivious polynomial evaluation (OPE). There are two parties, Alice ...
We study the problem of Oblivious Polynomial Evaluation (OPE), where one party has a polynomial P & ...
Private Polynomial Evaluation (PPE) allows the service provider to outsource the computation of a po...
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an eval...
International audienceOblivious Polynomial Evaluation (OPE) schemes are interactive protocols betwee...
In an unconditionally secure Distributed Oblivious Transfer (DOT) protocol, a receiver contacts at l...
We consider oblivious transfer protocols and their applications that use underneath semantically sec...