Oblivious transfer and applications

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

In this chapter we carry out an in-depth study of the problem of constructing efficient protocols for oblivious transfer (as introduced in Section 3.2.2). Oblivious transfer is one of the most important building blocks in cryptography, and is very useful for constructing secure protocols. We demonstrate this by showing how to achieve secure pseudorandom function evaluation using oblivious transfer.

Original languageEnglish
Title of host publicationInformation Security and Cryptography
PublisherSpringer International Publishing
Pages177-212
Number of pages36
DOIs
StatePublished - 2010

Publication series

NameInformation Security and Cryptography
Volume15
ISSN (Print)1619-7100
ISSN (Electronic)2197-845X

Bibliographical note

Publisher Copyright:
© 2010, Springer-Verlag Berlin Heidelberg.

Fingerprint

Dive into the research topics of 'Oblivious transfer and applications'. Together they form a unique fingerprint.

Cite this