Cryptographic Techniques
Pseudo-random functions (block ciphers)
Digital signatures
“Garbled” circuits
Proxy-Oblivious Transfer (new)
Non-malleable public-key encryption
Still, the resulting protocol is very efficient
Previous slide
Next slide
Back to first slide
View graphic version