Cryptographic Protocols


Posted on in Presentations

Oblivious Transfer extension protocols and more efficient encrypted search schemes are discussed. Topic 1: Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection Authors: Michele Orru, Emmanuela Orsini and Peter Scholl Topic 2: Low-Leakage Secure Search for Boolean Expressions Authors: Fernando Krell, Gabriela Ciocarlie, Ashish Gehani and Mariana Raykova

Participants
Fernando Krell

Participant

Researcher and Developer Engineer, Dreamlab Technologies

Peter Scholl

Participant

Research Associate, University of Bristol

Protecting Data & Applied Crypto

cryptography


Topic

Subtopic


Share With Your Community