Oblivious Linear Evaluation (OLE) is the arithmetic analogue of the well-know oblivious transfer primitive. It allows a sender, holding an affine function $f(x)=a+bx$ over a finite field or ring, to let a receiver learn $f(w)$ for a $w$ of the receiver\u27s choice. In terms of security, the sender remains oblivious of the receiver\u27s input $w$, whereas the receiver learns nothing beyond $f(w)$ about $f$. In recent years, OLE has emerged as an essential building block to construct efficient, reusable and maliciously-secure two-party computation. In this work, we present efficient two-round protocols for OLE over large fields based on the Learning with Errors (LWE) assumption, providing a full arithmetic generalization of the oblivious tra...
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and multi-part...
In a seminal work, Katz (Eurocrypt 2007) showed that parties being able to issue tamper-proof hardwa...
Private set intersection is an important area of research and has been the focus of many works over ...
An oblivious linear function evaluation protocol, or OLE, is a two-party protocol for the function $...
Oblivious linear evaluation (OLE) is a fundamental building block in multi-party computation protoco...
We introduce a new approach to actively secure two-party computation based on so-called oblivious li...
Oblivious linear evaluation is a generalization of oblivious transfer, whereby two distrustful parti...
: We construct a two-message oblivious transfer (OT) protocol without setup that guarantees statisti...
BUG REPORT: In early 2021 we were made aware of a bug in Lemma 9.1 by Carmit Hazay, Muthu Venkitasu...
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an eval...
We study the problem of two round oblivious evaluation of cryptographic functionalities. In this set...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
We construct a protocol for constant round Two-Party Secure Function Evaluation in the standard mode...
We present a new, simple candidate construction of indistinguishability obfuscation (iO). Our scheme...
AbstractWe study the problem of oblivious polynomial evaluation (OPE). There are two parties, Alice ...
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and multi-part...
In a seminal work, Katz (Eurocrypt 2007) showed that parties being able to issue tamper-proof hardwa...
Private set intersection is an important area of research and has been the focus of many works over ...
An oblivious linear function evaluation protocol, or OLE, is a two-party protocol for the function $...
Oblivious linear evaluation (OLE) is a fundamental building block in multi-party computation protoco...
We introduce a new approach to actively secure two-party computation based on so-called oblivious li...
Oblivious linear evaluation is a generalization of oblivious transfer, whereby two distrustful parti...
: We construct a two-message oblivious transfer (OT) protocol without setup that guarantees statisti...
BUG REPORT: In early 2021 we were made aware of a bug in Lemma 9.1 by Carmit Hazay, Muthu Venkitasu...
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an eval...
We study the problem of two round oblivious evaluation of cryptographic functionalities. In this set...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
We construct a protocol for constant round Two-Party Secure Function Evaluation in the standard mode...
We present a new, simple candidate construction of indistinguishability obfuscation (iO). Our scheme...
AbstractWe study the problem of oblivious polynomial evaluation (OPE). There are two parties, Alice ...
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and multi-part...
In a seminal work, Katz (Eurocrypt 2007) showed that parties being able to issue tamper-proof hardwa...
Private set intersection is an important area of research and has been the focus of many works over ...