BUG REPORT: In early 2021 we were made aware of a bug in Lemma 9.1 by Carmit Hazay, Muthu Venkitasubramaniam, Laasya Bangalore, and Rishabh Bhadauria. The bug does not have an easy fix and we are currently exploring whether a different proof can be found. Until then the results of this paper should not be considered proven and in particular the protocols should not be considered secure. We will later either update the e-print version with a new proof or withdraw the paper. ORIGINAL ABSTRACT: In this work we consider the problem of oblivious linear function evaluation (OLE). OLE is a special case of oblivious polynomial evaluation (OPE) and deals with the oblivious evaluation of a linear function $f(x)=ax+b$. This problem is non-trivial i...
In a paper from EuroCrypt'99, Damgård, Kilian and Salvail show various positive and negative results...
Consider the following problem: You have a device that is supposed to compute a linear combination o...
Consider the following problem: You have a device that is supposed to compute a linear combination o...
We introduce a new approach to actively secure two-party computation based on so-called oblivious li...
An oblivious linear function evaluation protocol, or OLE, is a two-party protocol for the function $...
Oblivious Linear Evaluation (OLE) is the arithmetic analogue of the well-know oblivious transfer pri...
Vanishree et.al proposed a novel unconditionally oblivious polynomial evaluation protocol and they c...
AbstractWe study the problem of oblivious polynomial evaluation (OPE). There are two parties, Alice ...
Oblivious linear evaluation is a generalization of oblivious transfer, whereby two distrustful parti...
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polyn...
Oblivious linear evaluation (OLE) is a fundamental building block in multi-party computation protoco...
We construct a protocol for constant round Two-Party Secure Function Evaluation in the standard mode...
Oblivious polynomial evaluation (OPE) is a two-party protocol that allows a receiver, R to learn an ...
In a seminal work, Katz (Eurocrypt 2007) showed that parties being able to issue tamper-proof hardwa...
Private set intersection is an important area of research and has been the focus of many works over ...
In a paper from EuroCrypt'99, Damgård, Kilian and Salvail show various positive and negative results...
Consider the following problem: You have a device that is supposed to compute a linear combination o...
Consider the following problem: You have a device that is supposed to compute a linear combination o...
We introduce a new approach to actively secure two-party computation based on so-called oblivious li...
An oblivious linear function evaluation protocol, or OLE, is a two-party protocol for the function $...
Oblivious Linear Evaluation (OLE) is the arithmetic analogue of the well-know oblivious transfer pri...
Vanishree et.al proposed a novel unconditionally oblivious polynomial evaluation protocol and they c...
AbstractWe study the problem of oblivious polynomial evaluation (OPE). There are two parties, Alice ...
Oblivious linear evaluation is a generalization of oblivious transfer, whereby two distrustful parti...
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polyn...
Oblivious linear evaluation (OLE) is a fundamental building block in multi-party computation protoco...
We construct a protocol for constant round Two-Party Secure Function Evaluation in the standard mode...
Oblivious polynomial evaluation (OPE) is a two-party protocol that allows a receiver, R to learn an ...
In a seminal work, Katz (Eurocrypt 2007) showed that parties being able to issue tamper-proof hardwa...
Private set intersection is an important area of research and has been the focus of many works over ...
In a paper from EuroCrypt'99, Damgård, Kilian and Salvail show various positive and negative results...
Consider the following problem: You have a device that is supposed to compute a linear combination o...
Consider the following problem: You have a device that is supposed to compute a linear combination o...