Secure two-party threshold ECDSA from ECDSA assumptions

J Doerner, Y Kondi, E Lee… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
The Elliptic Curve Digital Signature Algorithm (ECDSA) is one of the most widely used
schemes in deployed cryptography. Through its applications in code and binary …

The simplest protocol for oblivious transfer

T Chou, C Orlandi - Progress in Cryptology--LATINCRYPT 2015: 4th …, 2015 - Springer
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this
paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is …

Efficient constant-round MPC with identifiable abort and public verifiability

C Baum, E Orsini, P Scholl, E Soria-Vazquez - Annual International …, 2020 - Springer
Recent years have seen a tremendous growth in the interest in secure multiparty
computation (MPC) and its applications. While much progress has been made concerning …

Endemic oblivious transfer

D Mansy, P Rindal - Proceedings of the 2019 ACM SIGSAC Conference …, 2019 - dl.acm.org
Oblivious Transfer has played a crucial role in the design of secure multi party computation.
Nevertheless, there are not many practical solutions that achieve simulation based security …

Algebraic adversaries in the universal composability framework

M Abdalla, M Barbosa, J Katz, J Loss, J Xu - Advances in Cryptology …, 2021 - Springer
The algebraic-group model (AGM), which lies between the generic group model and the
standard model of computation, provides a means by which to analyze the security of …

A framework for efficient adaptively secure composable oblivious transfer in the ROM

PSLM Barreto, B David, R Dowsley, K Morozov… - arXiv preprint arXiv …, 2017 - arxiv.org
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of
applications, in particular, as an essential building block for two-party and multi-party …

Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge

S Chakraborty, C Ganesh, P Sarkar - … on the Theory and Applications of …, 2023 - Springer
In the setting of subversion, an adversary tampers with the machines of the honest parties
thus leaking the honest parties' secrets through the protocol transcript. The work of Mironov …

Efficient and round-optimal oblivious transfer and commitment with adaptive security

R Canetti, P Sarkar, X Wang - International Conference on the Theory and …, 2020 - Springer
We construct the most efficient two-round adaptively secure bit-OT in the Common Random
String (CRS CRS) model. The scheme is UC secure under the Decisional Diffie-Hellman …

Blazing fast OT for three-round UC OT extension

R Canetti, P Sarkar, X Wang - Public-Key Cryptography–PKC 2020: 23rd …, 2020 - Springer
Oblivious Transfer (OT) is an important building block for multi-party computation (MPC).
Since OT requires expensive public-key operations, efficiency-conscious MPC protocols use …

A Simple Post-Quantum Oblivious Transfer Protocol from Mod-LWR

S Dong, H Cui, K Zhang, K Yang, Y Yu - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Oblivious transfer (OT) is a fundamental cryptographic protocol that plays a crucial role in
secure multi-party computation (MPC). Most practical OT protocols by, eg, Naor and Pinkas …