In the information-theoretic setting, where adversaries have unlimited computational power, the fundamental cryptographic primitive Oblivious Transfer (OT) cannot be securely achieved if the parties are communicating over a clear channel. To preserve secrecy and security, the players have to rely on noise in the communication. Noisy channels are therefore a useful tool to model noise behavior and build protocols implementing OT. This paper explores a source of errors that is inherently present in practically any transmission medium, but has been scarcely studied in this context: delays in the communication. In order to have a model for the delays that is both general and comparable to the channels usually used for OT – such as the Binary Sy...
Realizing fundamental cryptographic primitives with unconditional security is a central topic in inf...
In this paper, we deal with the task of obtaining oblivious transfer (OT) from noisy resources. We c...
Realizing fundamental cryptographic primitives with unconditional security is a central topic in inf...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
If we assume that adversaries have unlimited computational capabilities, secure computation between ...
If we assume that adversaries have unlimited computational capabilities, secure computation between ...
Without the use of computational assumptions, unconditionally secure oblivious transfer (OT) is impo...
Secure multi-party computation (MPC) deals with the problem of shared computation between parties th...
Secure multi-party computation (MPC) deals with the problem of shared computation between parties th...
In secure two-party computation, two mutually distrusting parties are interested in jointly computin...
In secure two-party computation, two mutually distrusting parties are interested in jointly computin...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
In a paper from EuroCrypt'99, Damgård, Kilian and Salvail show various positive and negative results...
We consider the problem of basing Oblivious Transfer (OT)and Bit Commitment (BC), with information t...
Historically, cryptography was created and used to deliver messages between people in such a way tha...
Realizing fundamental cryptographic primitives with unconditional security is a central topic in inf...
In this paper, we deal with the task of obtaining oblivious transfer (OT) from noisy resources. We c...
Realizing fundamental cryptographic primitives with unconditional security is a central topic in inf...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
If we assume that adversaries have unlimited computational capabilities, secure computation between ...
If we assume that adversaries have unlimited computational capabilities, secure computation between ...
Without the use of computational assumptions, unconditionally secure oblivious transfer (OT) is impo...
Secure multi-party computation (MPC) deals with the problem of shared computation between parties th...
Secure multi-party computation (MPC) deals with the problem of shared computation between parties th...
In secure two-party computation, two mutually distrusting parties are interested in jointly computin...
In secure two-party computation, two mutually distrusting parties are interested in jointly computin...
Abstract. Oblivious transfer (OT) is a cryptographic primitive of cen-tral importance, in particular...
In a paper from EuroCrypt'99, Damgård, Kilian and Salvail show various positive and negative results...
We consider the problem of basing Oblivious Transfer (OT)and Bit Commitment (BC), with information t...
Historically, cryptography was created and used to deliver messages between people in such a way tha...
Realizing fundamental cryptographic primitives with unconditional security is a central topic in inf...
In this paper, we deal with the task of obtaining oblivious transfer (OT) from noisy resources. We c...
Realizing fundamental cryptographic primitives with unconditional security is a central topic in inf...