Secure two-party threshold ECDSA from ECDSA assumptions
The Elliptic Curve Digital Signature Algorithm (ECDSA) is one of the most widely used
schemes in deployed cryptography. Through its applications in code and binary …
schemes in deployed cryptography. Through its applications in code and binary …
The simplest protocol for oblivious transfer
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this
paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is …
paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is …
Efficient constant-round MPC with identifiable abort and public verifiability
Recent years have seen a tremendous growth in the interest in secure multiparty
computation (MPC) and its applications. While much progress has been made concerning …
computation (MPC) and its applications. While much progress has been made concerning …
Endemic oblivious transfer
D Mansy, P Rindal - Proceedings of the 2019 ACM SIGSAC Conference …, 2019 - dl.acm.org
Oblivious Transfer has played a crucial role in the design of secure multi party computation.
Nevertheless, there are not many practical solutions that achieve simulation based security …
Nevertheless, there are not many practical solutions that achieve simulation based security …
Algebraic adversaries in the universal composability framework
The algebraic-group model (AGM), which lies between the generic group model and the
standard model of computation, provides a means by which to analyze the security of …
standard model of computation, provides a means by which to analyze the security of …
A framework for efficient adaptively secure composable oblivious transfer in the ROM
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of
applications, in particular, as an essential building block for two-party and multi-party …
applications, in particular, as an essential building block for two-party and multi-party …
Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge
In the setting of subversion, an adversary tampers with the machines of the honest parties
thus leaking the honest parties' secrets through the protocol transcript. The work of Mironov …
thus leaking the honest parties' secrets through the protocol transcript. The work of Mironov …
Efficient and round-optimal oblivious transfer and commitment with adaptive security
We construct the most efficient two-round adaptively secure bit-OT in the Common Random
String (CRS CRS) model. The scheme is UC secure under the Decisional Diffie-Hellman …
String (CRS CRS) model. The scheme is UC secure under the Decisional Diffie-Hellman …
Blazing fast OT for three-round UC OT extension
Oblivious Transfer (OT) is an important building block for multi-party computation (MPC).
Since OT requires expensive public-key operations, efficiency-conscious MPC protocols use …
Since OT requires expensive public-key operations, efficiency-conscious MPC protocols use …
A Simple Post-Quantum Oblivious Transfer Protocol from Mod-LWR
Oblivious transfer (OT) is a fundamental cryptographic protocol that plays a crucial role in
secure multi-party computation (MPC). Most practical OT protocols by, eg, Naor and Pinkas …
secure multi-party computation (MPC). Most practical OT protocols by, eg, Naor and Pinkas …