Two-Round Oblivious Transfer from CDH or LPN
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a concise presentation on two-round oblivious transfer protocols based on Computational Diffie-Hellman (CDH) or Learning Parity with Noise (LPN) assumptions. Delve into the paper by Döttling, Garg, Hajiabadi, Masny, and Wichs, presented at Eurocrypt 2020. Gain insights into basic concepts, simulation-based security, and receiver security. Examine key results, including Search OT and Indistinguishable OT, and understand the significance of these findings in the field of cryptography.
Syllabus
Introduction
Basic concepts
Simulationbased security
Security for the receiver
Results
Search OT
Indistinguishable OT
Why is it interesting
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera