To create 1-out-of-N, we use log2(N) 1-out-of-2 oblivious transfers of random bits to create log2(N) random strings. Each secret is masked with one of these strings (by XOR) and the receiving party ...