Abstract
In this chapter we carry out an in-depth study of the problem of constructing efficient protocols for oblivious transfer (as introduced in Section 3.2.2). Oblivious transfer is one of the most important building blocks in cryptography, and is very useful for constructing secure protocols. We demonstrate this by showing how to achieve secure pseudorandom function evaluation using oblivious transfer.
Original language | English |
---|---|
Title of host publication | Information Security and Cryptography |
Publisher | Springer International Publishing |
Pages | 177-212 |
Number of pages | 36 |
DOIs | |
State | Published - 2010 |
Publication series
Name | Information Security and Cryptography |
---|---|
Volume | 15 |
ISSN (Print) | 1619-7100 |
ISSN (Electronic) | 2197-845X |
Bibliographical note
Publisher Copyright:© 2010, Springer-Verlag Berlin Heidelberg.