Common use of Building Blocks Clause in Contracts

Building Blocks. ‌ In Section 3.1.1, we briefly review oblivious transfer. In Section 3.1.2, we review Yao’s Garbled Circuits. In Section 3.1.3, we describe in more detail our take on the dual execution protocol, and how we avoid leakage to the adversary when the pass-strings used are dissimilar.

Appears in 1 contract

Sources: Fuzzy Password Authenticated Key Exchange

Building Blocks. ‌ In Section 3.1.1, we briefly review oblivious transfer. In Section 3.1.2, we review Yao’s Garbled Circuits. In Section 3.1.3, we describe in more detail our take on the dual execution exe- cution protocol, and how we avoid leakage to the adversary when the pass-strings used are dissimilar.

Appears in 1 contract

Sources: Fuzzy Password Authenticated Key Exchange