Sciweavers

7 search results - page 2 / 2
» Generalized oblivious transfer by secret sharing
Sort
View
IACR
2011
105views more  IACR 2011»
12 years 4 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
13 years 6 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...