YoVDO

Two-Round Oblivious Transfer from CDH or LPN

Offered By: TheIACR via YouTube

Tags

Oblivious Transfer Courses Cryptography Courses

Course Description

Overview

Explore a concise presentation on two-round oblivious transfer protocols based on Computational Diffie-Hellman (CDH) or Learning Parity with Noise (LPN) assumptions. Delve into the paper by Döttling, Garg, Hajiabadi, Masny, and Wichs, presented at Eurocrypt 2020. Gain insights into basic concepts, simulation-based security, and receiver security. Examine key results, including Search OT and Indistinguishable OT, and understand the significance of these findings in the field of cryptography.

Syllabus

Introduction
Basic concepts
Simulationbased security
Security for the receiver
Results
Search OT
Indistinguishable OT
Why is it interesting


Taught by

TheIACR

Related Courses

Secure Computation: Part I
NPTEL via Swayam
Avant-Garde Crypto and Protocols
TheIACR via YouTube
Blazing Fast OT for Three-Round UC OT Extension
TheIACR via YouTube
Stacked Garbling for Disjunctive Zero-Knowledge Proofs
TheIACR via YouTube
Statistical Witness Indistinguishability -and More- in Two Messages
TheIACR via YouTube