This paper discusses a method whereby two adversaries can exchange information worth an arbitrarily small “fraction of a bit”, in a particular setting (see ), although neither trusts the other.
KeywordsOblivious Transfer Distinct Root Provably Secure Significant Chance Computer Science Division
Unable to display preview. Download preview PDF.
- R. Berger, H. Karloff, D. Shmoys, “The Crytographic Security of The Sum of Bits”, in preparation.Google Scholar
- R. Berger, R. Peralta, T. Tedrick, “A Provably Secure Oblivious Transfer”, to be submitted to STOC.Google Scholar
- L. Blum, M. Blum and M. Shub, “A Simple Secure Pseudo-Random Number Generator”, to appear in SIAM Journal of Computing.Google Scholar
- M. Blum, “How to Exchange (Secret) Keys”, ACM Transactions on Computer Systems (1983). (1982).Google Scholar
- M. Blum and S. Micali, “How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits”, 1982 FOCS.Google Scholar
- M. Luby, S. Micali and C. Rackoff, “The MiRackoLus Exchange of a Secret Bit”, to appear in 1983 FOCS.Google Scholar
- T. Tedrick, “Advantages of Using Multiple Keys in Public Key Encryption Protocols”, in preparation.Google Scholar
- U. Vazirani and V. Vazirani, “Trap-door Psuedo-Random Number Number Generators”, to appear in 1983 FOCS.Google Scholar