Extending oblivious transfers efficiently
We consider the problem of extending oblivious transfers: Given a small number of oblivious
transfers “for free,” can one implement a large number of oblivious transfers? Beaver has …
transfers “for free,” can one implement a large number of oblivious transfers? Beaver has …
Separating succinct non-interactive arguments from all falsifiable assumptions
An argument system for NP is succinct, if its communication complexity is polylogarithmic the
instance and witness sizes. The seminal works of Kilian'92 and Micali'94 show that such …
instance and witness sizes. The seminal works of Kilian'92 and Micali'94 show that such …
[KNIHA][B] Mathematics and computation: A theory revolutionizing technology and science
A Wigderson - 2019 - books.google.com
From the winner of the Turing Award and the Abel Prize, an introduction to computational
complexity theory, its connections and interactions with mathematics, and its central role in …
complexity theory, its connections and interactions with mathematics, and its central role in …
Notions of reducibility between cryptographic primitives
Starting with the seminal paper of Impagliazzo and Rudich [17], there has been a large body
of work showing that various cryptographic primitives cannot be reduced to each other via …
of work showing that various cryptographic primitives cannot be reduced to each other via …
Quantum oblivious transfer: a short review
Quantum cryptography is the field of cryptography that explores the quantum properties of
matter. Generally, it aims to develop primitives beyond the reach of classical cryptography …
matter. Generally, it aims to develop primitives beyond the reach of classical cryptography …
Session-key generation using human passwords only
We present session-key generation protocols in a model where the legitimate parties share
only a human-memorizable password, and there is no additional set-up assumption in the …
only a human-memorizable password, and there is no additional set-up assumption in the …
Computationally secure oblivious transfer
We describe new computationally secure protocols of 1-out-of-N oblivious transfer, k-out-of-
N oblivious transfer, and oblivious transfer with adaptive queries. The protocols are very …
N oblivious transfer, and oblivious transfer with adaptive queries. The protocols are very …
Two-message statistically sender-private OT from LWE
We construct a two-message oblivious transfer (OT) protocol without setup that guarantees
statistical privacy for the sender even against malicious receivers. Receiver privacy is game …
statistical privacy for the sender even against malicious receivers. Receiver privacy is game …
A general composition theorem for secure reactive systems
We consider compositional properties of reactive systems that are secure in a cryptographic
sense. We follow the well-known simulatability approach of modern cryptography, ie, the …
sense. We follow the well-known simulatability approach of modern cryptography, ie, the …
Homomorphic encryption
S Halevi - Tutorials on the Foundations of Cryptography …, 2017 - Springer
Fully homomorphic encryption (FHE) has been called the “Swiss Army knife of
cryptography”, since it provides a single tool that can be uniformly applied to many …
cryptography”, since it provides a single tool that can be uniformly applied to many …