9.3.2 Example A simple protocol for 1-2 oblivious transfer in the noisy-storage model
Course subject(s)
09. Perfect security from physical assumptions
Now we will look at an example execution of the 1-2 Oblivious Transfer protocol described in the previous video.
Sorry but there don't seem to be any downloads..
Subtitles (captions) in other languages than provided can be viewed at YouTube. Select your language in the CC-button of YouTube.
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.