Главная
Study mode:
on
1
Intro
2
Secure Two Party Computation
3
Motivating Oblivious Transfer Extension
4
Types of Oblivious Transfer Extension Protocols
5
OT Extension for small number of OTS
6
Round Complexity of OT Extension
7
Our Contributions
8
Comparison
9
KOS OT Extension (Cont.)
10
Weaker Requirements from Seed OT Protocol
11
Attempt towards our Seed OT Protocol (Cont.)
12
Efficiency
13
Open questions
14
References
Description:
Explore a conference talk on oblivious transfer (OT) extension protocols, focusing on a novel three-round universally composable (UC) OT extension. Learn about secure two-party computation, motivations for OT extension, various protocol types, and round complexity. Discover the presenters' contributions, comparisons with existing methods, and insights into the KOS OT extension. Examine weaker requirements for seed OT protocols, efficiency considerations, and potential improvements. Conclude with open questions and references for further research in this cryptographic field.

Blazing Fast OT for Three-Round UC OT Extension

TheIACR
Add to list
0:00 / 0:00