Abstract

AbstractIn the previous chapter, we have shown that one can implement the GMW protocol in the plain model, if we know how to securely compute the OT function \({\mathcal F}_{\textsf{OT}}\). In this chapter, our focus will be to securely compute \({\mathcal F}_{\textsf{OT}}\). As mentioned earlier, OT in itself is a very important cryptographic primitive and has been studied in depth. There are many instantiations available based on a spectrum of assumptions. Our goal is not to cover all of them. We refer the interested readers to [88] for a more detailed and rigorous coverage of OT.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call