Sciweavers

14 search results - page 2 / 3
» Oblivious Transfer from Weak Noisy Channels
Sort
View
STOC
1999
ACM
122views Algorithms» more  STOC 1999»
14 years 3 days ago
Oblivious Transfer and Polynomial Evaluation
Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input is a polynomial P, and a receiver whose input is a value α. At the end of the protocol t...
Moni Naor, Benny Pinkas
CRYPTO
2005
Springer
116views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
New Monotones and Lower Bounds in Unconditional Two-Party Computation
Since bit and string oblivious transfer and commitment, two primitives of paramount importance in secure two- and multi-party computation, cannot be realized in an unconditionally ...
Stefan Wolf, Jürg Wullschleger
CORR
2006
Springer
146views Education» more  CORR 2006»
13 years 7 months ago
Oblivious-Transfer Amplification
Abstract. Oblivious transfer (OT) is a primitive of paramount importance in cryptography or, more precisely, two- and multi-party computation due to its universality. Unfortunately...
Jürg Wullschleger
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
14 years 1 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...
CORR
2008
Springer
136views Education» more  CORR 2008»
13 years 7 months ago
On the Capacity and Generalized Degrees of Freedom of the X Channel
We explore the capacity and generalized degrees of freedom of the 2-user Gaussian X channel, i.e. a generalization of the 2-user interference channel where there is an independent...
Chiachi Huang, Viveck R. Cadambe, Syed Ali Jafar