In this chapter we carry out an in-depth study of the problem of constructing efficient protocols for oblivious transfer (as introduced in Section 3.2.2). Oblivious transfer is one of the most important building blocks in cryptography, and is very useful for constructing secure protocols. We demonstrate this by showing how to achieve secure pseudorandom function evaluation using oblivious transfer.
|Title of host publication||Information Security and Cryptography|
|Publisher||Springer International Publishing|
|Number of pages||36|
|State||Published - 2010|
|Name||Information Security and Cryptography|
Bibliographical notePublisher Copyright:
© 2010, Springer-Verlag Berlin Heidelberg.