Our Contribution. In this paper, we make progress on the above questions. First, we close the gap left open in [KMS16] and show that information theoretically secure oblivious transfer follows from any non-trivial EC. Along the way, we also construct commitments where the receiver commits, from any non-trivial EC. β β
Appears in 2 contracts
Sources: Oblivious Transfer Protocol, Oblivious Transfer Protocol