Research output per year
Research output per year
Rafael Dowsley, Jeroen Van De Graaf, Jörn Müller-Quade, Anderson C.A. Nascimento
Research output: Chapter in Book/Report/Conference proceeding › Conference Paper › Research › peer-review
We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliece cryptosystem: the hardness of decoding random binary linear codes, and the difficulty of distinguishing a permuted generating matrix of Goppa codes from a random matrix. To our knowledge this is the first OT reduction to these problems only.
Original language | English |
---|---|
Title of host publication | Information Theoretic Security - Third International Conference, ICITS 2008, Proceedings |
Editors | Reihaneh Safavi-Naini |
Publisher | Springer |
Pages | 107-117 |
Number of pages | 11 |
ISBN (Print) | 3540850929, 9783540850922 |
DOIs | |
Publication status | Published - 2008 |
Externally published | Yes |
Event | 3rd International Conference on Information Theoretic Security, ICITS 2008 - Calgary, AB, Canada Duration: 10 Aug 2008 → 13 Aug 2008 |
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 5155 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference | 3rd International Conference on Information Theoretic Security, ICITS 2008 |
---|---|
Country/Territory | Canada |
City | Calgary, AB |
Period | 10/08/08 → 13/08/08 |
Research output: Contribution to journal › Article › Research › peer-review