<--- Back to Details
First PageDocument Content
Cryptography / Commitment scheme / Public-key cryptography / Secret sharing / Power dividers and directional couplers / Oblivious transfer / Private information retrieval / NC
Date: 2014-09-26 08:36:33
Cryptography
Commitment scheme
Public-key cryptography
Secret sharing
Power dividers and directional couplers
Oblivious transfer
Private information retrieval
NC

LNCSRobuster Combiners for Oblivious Transfer

Add to Reading List

Source URL: dcg.ethz.ch

Download Document from Source Website

File Size: 483,76 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Commitment scheme / ElGamal encryption / DiffieHellman key exchange / Elgamal / Homomorphic encryption

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1rsiG - View Document

Cryptography / Polynomials / Probabilistic complexity theory / IP / Commitment scheme / NP / Interactive proof system / Zero-knowledge proof / Polynomial interpolation / Polynomial / Random self-reducibility / Permutation polynomial

Locally Random Reductions: Improvements and Applications  D. Beavery J. Feigenbaumz J. Kilianx September 1, 1995

DocID: 1raDV - View Document

Cryptography / Graph theory / Mathematics / NP-complete problems / Zero-knowledge proof / Algebraic graph theory / Commitment scheme / Hamiltonian path problem / Hamiltonian path / Proof of knowledge / Adjacency matrix / NP

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1rauh - View Document

Cryptography / Public-key cryptography / Computational complexity theory / Paillier cryptosystem / Proof of knowledge / Commitment scheme / RSA / Zero-knowledge proof / Permutation / ElGamal encryption / IP

A Commitment-Consistent Proof of a Shuffle Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. We introduce a pre-computation technique that drastically

DocID: 1r7EK - View Document

Cryptography / Cryptographic protocols / Secure multi-party computation / Public-key cryptography / Oblivious transfer / Information-theoretic security / Secure two-party computation / Commitment scheme

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1qUxu - View Document