Explore a concise presentation on two-round oblivious transfer protocols based on Computational Diffie-Hellman (CDH) or Learning Parity with Noise (LPN) assumptions. Delve into the paper by Döttling, Garg, Hajiabadi, Masny, and Wichs, presented at Eurocrypt 2020. Gain insights into basic concepts, simulation-based security, and receiver security. Examine key results, including Search OT and Indistinguishable OT, and understand the significance of these findings in the field of cryptography.
Overview
Syllabus
Introduction
Basic concepts
Simulationbased security
Security for the receiver
Results
Search OT
Indistinguishable OT
Why is it interesting
Taught by
TheIACR