Abstract
We show how to implement oblivious transfer without interaction, through the medium of a public file. As an application we can get non-interactive zero knowledge proofs via the same public file.
Supported in part by NSF grant CCR-87-19689 and DARPA Contract N00014-89-J-1988.
Supported in part by NSF grant DCR-84-13577, ARO grant DAALO3-86-K-0171, and DARPA Contract N00014-89-J-1988.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bellare, M., and S. Goldwasser, “A New Paradigm for Digital Signataures and Message Authentication based on Non-Interactive Zero Knowledge Proofs,” CRYPTO 89.
Bellare, M., and S. Micali, “How to Sign Given Any Trapdoor Function,” STOC 88.
Ben-Or, M., S. Goldwasser, and A. Wigderson, “Completeness Theorem for Non-Cryptographic Fault Tolerant Distributed Computing,” STOC 88.
Blum, M., and S. Micali, “How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits,” SIAM Journal on Computing, Vol. 13, No. 4 (November 1984), 850–864.
Brassard, G., C. Crépeau, and J.-M. Robert, “Information Theoretic Reductions among Disclosure Problems,” FOCS 86.
Blum, M., P. Feldman and S. Micali, “Non-Interactive Zero Knowledge and its Applications,” STOC 88.
Chaum, D., C. Crépeau and I. Damgård, “Multiparty Unconditionally Secure Protocols,” STOC 88.
Galil, Z., S. Haber and M. Yung, “Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public Key Model,” CRYPTO 87.
Goldwasser, S., and S. Micali, “Probabilistic Encryption,” Journal of Computer and System Sciences 28 (April 1984), 270–299.
Goldreich, O. and L. Levin, “A Hard-Core Predicate for any One-Way Function,” STOC 89.
Goldreich, O., S. Micali and A. Wigderson, “A Completeness Theorem for Protocols with Honest Majority,” STOC 87.
Kilian, J., “Founding Cryptography on Oblivious Transfer,” STOC 88.
Kilian, J., personal communication.
Kilian, J., S. Micali and R. Ostrovsky, “Efficient Zero Knowledge Proofs with Bounded Interaction,” CRYPTO 89.
Micali, S., personal communication, March 1989.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bellare, M., Micali, S. (1990). Non-Interactive Oblivious Transfer and Applications. In: Brassard, G. (eds) Advances in Cryptology — CRYPTO’ 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol 435. Springer, New York, NY. https://doi.org/10.1007/0-387-34805-0_48
Download citation
DOI: https://doi.org/10.1007/0-387-34805-0_48
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97317-3
Online ISBN: 978-0-387-34805-6
eBook Packages: Springer Book Archive