Does bit commitment yield oblivious transfer in the information-theoretic security model?
Posted by Peter Shor , at cstheory.stackexchange.com,
Suppose you have two arbitrarily powerful participants who don't trust each other. They have access to bit commitment (e.g.…