Return to Article Details On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions Download Download PDF