A survey of oblivious transfer protocol
Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide
range of applications such as secure multi-party computation, private information retrieval …
range of applications such as secure multi-party computation, private information retrieval …
A survey on cryptographic techniques for protecting big data security: present and forthcoming
S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …
and provide novel ways of exploring the world. As they significantly create economic and …
Lossy cryptography from code-based assumptions
Over the past few decades, we have seen a proliferation of advanced cryptographic
primitives with lossy or homomorphic properties built from various assumptions such as …
primitives with lossy or homomorphic properties built from various assumptions such as …
Compact, efficient and UC-secure isogeny-based oblivious transfer
Oblivious transfer (OT) is an essential cryptographic tool that can serve as a building block
for almost all secure multiparty functionalities. The strongest security notion against …
for almost all secure multiparty functionalities. The strongest security notion against …
Non-interactive zero-knowledge from LPN and MQ
We give the first construction of non-interactive zero-knowledge (NIZK) arguments from post-
quantum assumptions other than Learning with Errors. In particular, we achieve NIZK under …
quantum assumptions other than Learning with Errors. In particular, we achieve NIZK under …
The hardness of LPN over any integer ring and field for PCG applications
Learning parity with noise (LPN) has been widely studied and used in cryptography. It was
recently brought to new prosperity since Boyle et al.(CCS'18), putting LPN to a central role in …
recently brought to new prosperity since Boyle et al.(CCS'18), putting LPN to a central role in …
Composable oblivious pseudo-random functions via garbled circuits
S Faller, A Ottenhues, J Ottenhues - International Conference on …, 2023 - Springer
Abstract Oblivious Pseudo-Random Functions (OPRFs) are a central tool for building
modern protocols for authentication and distributed computation. For example, OPRFs …
modern protocols for authentication and distributed computation. For example, OPRFs …
Obfuscation of pseudo-deterministic quantum circuits
We show how to obfuscate pseudo-deterministic quantum circuits, assuming the quantum
hardness of learning with errors (QLWE) and post-quantum virtual black-box (VBB) …
hardness of learning with errors (QLWE) and post-quantum virtual black-box (VBB) …
Statistical zaps and new oblivious transfer protocols
We study the problem of achieving statistical privacy in interactive proof systems and
oblivious transfer–two of the most well studied two-party protocols–when limited rounds of …
oblivious transfer–two of the most well studied two-party protocols–when limited rounds of …
Concretely efficient secure multi-party computation protocols: survey and more
D Feng, K Yang - Security and Safety, 2022 - sands.edpsciences.org
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on
their private inputs, and reveals nothing but the output of the function. In the last decade …
their private inputs, and reveals nothing but the output of the function. In the last decade …