Research Article
An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications
Table 2
Efficiency comparison.
| ||||||||||||||||||||||||||||||||||||||||||||||||||
Note: the efficiency of sender in OT is presented here, who inputs pairs of -bit length messages in protocol. Specially, is security parameter, denotes a group, and in 1-out-of- OT. |