-
Implement oblivious transfer and various extensions:
- 1-out-of-2 OT
- 1-n OT
- k-n OT
-
Can I call some function that can report the total traffic sent and received during the protocol execution?
-
Specify the ~[Ferret Correlated OT](https://eprint.iacr.org/2020/924.pdf)~ [KOS15](https://eprint.iacr.org/2015/546.pdf) correlated OT extension.
---
### Original Issue
![abit](https://github.com/cry…
-
--------------
Correlated oblivious transfers between parties for multiplication between polynomials A and K
--------------
Oblivious transfers successfully completed
Broadcasting individual sha…
-
**What version of WebTorrent Desktop are you using?**
0.21.0
**What operating system and version?**
Windows 10 Pro 1909
**What happened?**
A 60GB file download appeared to complete but the wr…
-
I was wondering if OblivC is secure for computing the malicious setting. [SoK](https://ieeexplore.ieee.org/document/8835312) mentions that this is not supported and yet Obliv-C includes `execDualexPro…
-
In YACL, all existing algorithms are under the semi-honest model.
My question is: is it possible to implement a Beaver Triple and shuffling protocols in the malicious setting? We need those protoco…
-
Hi, thanks for open sourcing swanky!
I'm a student interested in MPC and have just implemented [ Efficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption (HL17)]…
-
From section V of Zeestar : [Zeestar](https://files.sri.inf.ethz.ch/website/papers/sp22-zeestar.pdf)
it is possible to
1/ multiply any encrypted value by a public scalar,
or
2/ to multiply a pri…
-
When publishing a product to a cloud resource, we often want to make the product as easy to download as possible. Having a cloud-provider specific url scheme for the download requires the client to i…