Cryptology ePrint Archive: Report 2010/284

Available versions in chronological order


Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Yehuda Lindell and Benny Pinkas

Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Yehuda Lindell and Benny Pinkas
Publication Info: An extended abstract of this paper appeared in TCC 2011. This is the full version.

Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Yehuda Lindell and Benny Pinkas
Publication Info: An extended abstract appeared in TCC 2011; this is the full version.

Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Yehuda Lindell and Benny Pinkas
Publication Info: An extended abstract appeared in TCC 2011; this is the full version.

Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Yehuda Lindell and Benny Pinkas
Publication Info: An extended abstract appeared in TCC 2011; this is the full version.

Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Yehuda Lindell and Benny Pinkas
Publication Info: An extended abstract appeared in TCC 2011; this is the full version.

Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Yehuda Lindell and Benny Pinkas
Publication Info: An extended abstract appeared in TCC 2011; this is the full version.

Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Yehuda Lindell and Benny Pinkas
Original publication (with minor differences): IACR-JOC-2012


[ Cryptology ePrint archive ]