To create 1-out-of-N, we use log2(N) 1-out-of-2 oblivious transfers of random bits to create log2(N) random strings. Each secret is masked with one of these strings (by XOR) and the receiving party ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results