On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
- 15 April 1999
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security AssumptionsBRICS Report Series, 1998
- On the foundations of oblivious transferPublished by Springer Nature ,1998
- Oblivious Transfers and Privacy AmplificationPublished by Springer Nature ,1997
- Efficient Cryptographic Protocols Based on Noisy ChannelsPublished by Springer Nature ,1997
- Oblivious transfers and intersecting codesIEEE Transactions on Information Theory, 1996
- Generalized privacy amplificationIEEE Transactions on Information Theory, 1995
- Secret key agreement by public discussion from common informationIEEE Transactions on Information Theory, 1993
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systemsJournal of the ACM, 1991
- A general completeness theorem for two party gamesPublished by Association for Computing Machinery (ACM) ,1991
- Achieving oblivious transfer using weakened security assumptionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1988