We introduce a new approach to actively secure two-party computation based on so-called oblivious linear function evaluation (OLE), a natural generalisation of oblivious transfer (OT) and a special case of the notion of oblivious polynomial evaluation introduced by Naor and Pinkas at STOC 1999. OLE works over a finite field $\F$. In an OLE the sender inputs two field elements $a \in \F$ and $b \in \F$, and the receiver inputs a field element $x \in \F$ and learns only $f(x) = ax + b$. Our protocol can evaluate an arithmetic circuit over a finite field $\F$ given black-box access to OLE for $\F$. The protocol is unconditionally secure and consumes only a constant number of OLEs per multiplication gate. An OLE over a field $\F$ of size $O(2^\...
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polyn...
Vanishree et.al proposed a novel unconditionally oblivious polynomial evaluation protocol and they c...
Oblivious linear evaluation is a generalization of oblivious transfer, whereby two distrustful parti...
Oblivious Linear Evaluation (OLE) is the arithmetic analogue of the well-know oblivious transfer pri...
An oblivious linear function evaluation protocol, or OLE, is a two-party protocol for the function $...
BUG REPORT: In early 2021 we were made aware of a bug in Lemma 9.1 by Carmit Hazay, Muthu Venkitasu...
We study the complexity of securely evaluating an arithmetic circuit over a finite field $F$ in the ...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an eval...
We construct a protocol for constant round Two-Party Secure Function Evaluation in the standard mode...
In a seminal work, Katz (Eurocrypt 2007) showed that parties being able to issue tamper-proof hardwa...
Oblivious linear evaluation (OLE) is a fundamental building block in multi-party computation protoco...
AbstractWe study the problem of oblivious polynomial evaluation (OPE). There are two parties, Alice ...
Private set intersection is an important area of research and has been the focus of many works over ...
We study the problem of two round oblivious evaluation of cryptographic functionalities. In this set...
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polyn...
Vanishree et.al proposed a novel unconditionally oblivious polynomial evaluation protocol and they c...
Oblivious linear evaluation is a generalization of oblivious transfer, whereby two distrustful parti...
Oblivious Linear Evaluation (OLE) is the arithmetic analogue of the well-know oblivious transfer pri...
An oblivious linear function evaluation protocol, or OLE, is a two-party protocol for the function $...
BUG REPORT: In early 2021 we were made aware of a bug in Lemma 9.1 by Carmit Hazay, Muthu Venkitasu...
We study the complexity of securely evaluating an arithmetic circuit over a finite field $F$ in the ...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an eval...
We construct a protocol for constant round Two-Party Secure Function Evaluation in the standard mode...
In a seminal work, Katz (Eurocrypt 2007) showed that parties being able to issue tamper-proof hardwa...
Oblivious linear evaluation (OLE) is a fundamental building block in multi-party computation protoco...
AbstractWe study the problem of oblivious polynomial evaluation (OPE). There are two parties, Alice ...
Private set intersection is an important area of research and has been the focus of many works over ...
We study the problem of two round oblivious evaluation of cryptographic functionalities. In this set...
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polyn...
Vanishree et.al proposed a novel unconditionally oblivious polynomial evaluation protocol and they c...
Oblivious linear evaluation is a generalization of oblivious transfer, whereby two distrustful parti...