Login / Signup
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security.
Saikrishna Badrinarayanan
Daniel Masny
Pratyay Mukherjee
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
multi user
lower bound
multi granularity
upper bound
virtual environment
worst case
user interface
access control
database
virtual world
lightweight
security issues
multiple users
artificial intelligence
augmented reality
security policies