On robust combiners for oblivious transfer and other primitives (2005)

by Danny Harnik , Joe Kilian , Moni Naor , Omer Reingold , Alon Rosen
Venue:In Proc. Eurocrypt ’05
Citations:29 - 1 self

Active Bibliography

3 Completeness in Two-Party Secure Computation -- A Computational View – Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen
26 The All-or-Nothing Nature of Two-Party Secure Computation – Amos Beimel, Tal Malkin, Silvio Micali - 1999
Provably Secure . . . Based on Noisy Channels and the McEliece Assumptions – Rafael Baião Dowsley - 2008
1 Black-Box Constructions of Protocols for Secure Computation ∗ – Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank - 2010
19 Complexity and Security of Distributed Protocols – Matthew Keith Franklin - 1993
7 Varieties of Secure Distributed Computing – Matthew Franklin, Moti Yung - 1996
16 Semi-honest to malicious oblivious transfer - the black-box way – Iftach Haitner - 2008
17 Open Questions, Talk Abstracts, and Summary of Discussions – Joan Feigenbaum, Michael Merritt - 1991
12 Zero-Knowledge from Secure Multiparty Computation – Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai - 2007
6 Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions – Ran Canetti, Huijia Lin, Rafael Pass
50 Committed Oblivious Transfer and Private Multi-Party Computation – Claude Crépeau, Jeroen van de Graaf, Alain Tapp - 1995
13 On robust combiners for private information retrieval and other primitives – Remo Meier, Bartosz Przydatek - 2006
72 Practical Quantum Oblivious Transfer – Charles Bennett, Gilles Brassard - 1992
61 Lower bounds on the Efficiency of Generic Cryptographic Constructions – Rosario Gennaro, Yael Gertner, Jonathan Katz, Luca Trevisan - 2000
63 Notions of Reducibility between Cryptographic Primitives – Omer Reingold, Luca Trevisan, Salil Vadhan - 2004
75 Studies in Secure Multiparty Computation and Applications – Ran Canetti - 1996
7 Black-box constructions of two-party protocols from one-way functions – Rafael Pass, Hoeteck Wee - 2009
Studies in the Efficiency and (versus) Security of Cryptographic Tasks – Mohammad Mahmoody-ghidary
13 Secure Commitment Against A Powerful Adversary - A security primitive based on average intractability (Extended Abstract) – Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung - 1992