暂无分享,去创建一个
[1] Oded Goldreich,et al. How to Solve any Protocol Problem - An Efficiency Improvement , 1987, CRYPTO.
[2] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[3] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[4] Yuval Ishai,et al. Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.
[5] Julien P. Stern. A New Efficient All-Or-Nothing Disclosure of Secrets Protocol , 1998, ASIACRYPT.
[6] Abhishek Parakh. Oblivious Transfer Using Elliptic Curves , 2006, 2006 15th International Conference on Computing.
[7] Wen-Guey Tzeng,et al. Efficient k-out-of-n Oblivious Transfer Schemes , 2008, J. Univers. Comput. Sci..
[8] Moni Naor,et al. Oblivious Transfer with Adaptive Queries , 1999, CRYPTO.
[9] Abhishek Parakh,et al. Oblivious Transfer Based on Key Exchange , 2007, Cryptologia.
[10] Yi Mu,et al. m out of n Oblivious Transfer , 2002, ACISP.
[11] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[12] Wen-Guey Tzeng,et al. Efficient 1-Out-n Oblivious Transfer Schemes , 2002, Public Key Cryptography.
[13] Christian Cachin. On the Foundations of Oblivious Transfer , 1998, EUROCRYPT.
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] Lila Kari,et al. Secret Selling of Secrets with Several Buyers , 1990, Bull. EATCS.
[16] Gilles Brassard,et al. Information theoretic reductions among disclosure problems , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[17] Jianhong Zhang,et al. Practical t-out-n Oblivious Transfer and Its Applications , 2003, ICICS.