YoVDO

Two-Round Oblivious Transfer from CDH or LPN

Offered By: TheIACR via YouTube

Tags

Oblivious Transfer Courses Cryptography Courses

Course Description

Overview

Explore a concise presentation on two-round oblivious transfer protocols based on Computational Diffie-Hellman (CDH) or Learning Parity with Noise (LPN) assumptions. Delve into the paper by Döttling, Garg, Hajiabadi, Masny, and Wichs, presented at Eurocrypt 2020. Gain insights into basic concepts, simulation-based security, and receiver security. Examine key results, including Search OT and Indistinguishable OT, and understand the significance of these findings in the field of cryptography.

Syllabus

Introduction
Basic concepts
Simulationbased security
Security for the receiver
Results
Search OT
Indistinguishable OT
Why is it interesting


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera