View Document Preview and Link
Document Date: 2000-04-12 11:39:28 Open Document File Size: 224,26 KB Share Result on Facebook
Company IBM Zurich Research Laboratory / / / Event FDA Phase / Product Issues / Product Recall / / Facility NEC Research Institute / / IndustryTerm arbitrary algorithm / encrypted circuit computing g. / oblivious transfer protocols / secure computation protocols / probabilistic polynomial-time algorithm / probabilistic polynomial-time algorithms / sub-protocol / above solution / above protocol / secure function evaluation protocol / secure computation protocol / polynomial-time algorithms / oblivious transfer protocol / encrypted circuit computing g` / oneround secure computation protocol / ubiquitous tool / computing / transfer protocol / / Organization NEC Research Institute / / Person Unz / Bob / Ui / Ki / Alice / Knx / / Position extractor / simulator/extractor / player / model / honest-but-curious model / with perfect security against unbounded Bob / honest-but-curious model / / Product Definitions / OT-1 / H1 / OT-2 / Section / Bob / / Technology oblivious transfer protocol / above protocol / one-round oblivious transfer protocols / secure function evaluation protocol / polynomial-time algorithms / real protocol / transfer protocol / arbitrary algorithm / decoding algorithm / private key / secret key / one-round secure computation protocols / secure computation protocol / one-round protocol / one-round secure computation protocol / ANDOS protocol / resulting protocol / encryption / sampling algorithm / one-round oblivious transfer protocol / public key / OT-1 sub-protocol / 5.2 Protocol Our protocol / semantically secure encryption / oneround secure computation protocol / three probabilistic polynomial-time algorithms / probabilistic polynomial-time algorithm / simulation / / SocialTag