Главная
Study mode:
on
1
Intro
2
1-out-of-2 Oblivious Transfer
3
Oblivious Transfer 101
4
OT Extension: Basic Idea
5
Comparison of OT Extensions
6
OT Extension with Passive Security
7
Another Look at OT
8
Errors in Correlation
9
Hashing Step
10
Correlation Check - The Other Side
11
Implementation (Improved from Paper)
12
One Billion OTs with 2 Gbit/s
13
The Pipe is the Limit
Description:
Explore the intricacies of Oblivious Transfer (OT) Extension in this 23-minute conference talk. Delve into the fundamentals of OT, compare various extension techniques, and examine passive security considerations. Learn about correlation errors, hashing steps, and implementation improvements. Discover how to achieve one billion OTs with 2 Gbit/s throughput, ultimately understanding why "The Pipe is the Limit" in this advanced cryptographic discussion.

Malicious for Free OT Extension - The Pipe is the Limit

TheIACR
Add to list