Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security.
Saikrishna BadrinarayananDaniel MasnyPratyay MukherjeePublished in: ACNS (2022)
Keyphrases
- multi user
- lower bound
- virtual environment
- upper bound
- multi granularity
- information security
- augmented reality
- single user
- virtual world
- worst case
- information systems
- user interface
- privacy preserving
- transfer learning
- intrusion detection
- network security
- access control
- security issues
- multiple users
- collaborative writing
- artificial intelligence