9.3.2 Example A simple protocol for 1-2 oblivious transfer in the noisy-storage model

Course subject(s) 09. Perfect security from physical assumptions

Now we will look at an example execution of the 1-2 Oblivious Transfer protocol described in the previous video.

Sorry but there don't seem to be any downloads..

Subtitles (captions) in other languages than provided can be viewed at YouTube. Select your language in the CC-button of YouTube.

Creative Commons License
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.
Back to top