Efficient k-out-of-n Oblivious Transfer Schemes
暂无分享,去创建一个
[1] Zhide Chen,et al. Quantum m-out-of-n oblivious transfer , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).
[2] Moni Naor,et al. Oblivious Transfer with Adaptive Queries , 1999, CRYPTO.
[3] Markus Stadler,et al. Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.
[4] Chanathip Namprempre,et al. The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme , 2002, Financial Cryptography.
[5] Claude Crépeau,et al. Oblivious transfer with a memory-bounded receiver , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[6] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[7] Helger Lipmaa,et al. An Oblivious Transfer Protocol with Log-Squared Communication , 2005, ISC.
[8] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[9] Wen-Guey Tzeng,et al. Efficient k-out-of-n Oblivious Transfer Schemes , 2005, J. Univers. Comput. Sci..
[10] Gilles Brassard,et al. Oblivious transfers and intersecting codes , 1996, IEEE Trans. Inf. Theory.
[11] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[12] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[13] Oded Goldreich,et al. How to Solve any Protocol Problem - An Efficiency Improvement , 1987, CRYPTO.
[14] Silvio Micali,et al. Non-Interactive Oblivious Transfer and Applications , 1989, CRYPTO.
[15] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[16] Alfredo De Santis,et al. New Results on Unconditionally Secure Distributed Oblivious Transfer , 2002, Selected Areas in Cryptography.
[17] Gilles Brassard,et al. Practical Quantum Oblivious Transfer , 1991, CRYPTO.
[18] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[19] Moni Naor,et al. Distributed Oblivious Transfer , 2000, ASIACRYPT.
[20] Kaoru Kurosawa,et al. Oblivious keyword search , 2004, J. Complex..
[21] Yan Zong Ding,et al. Oblivious Transfer in the Bounded Storage Model , 2001, CRYPTO.
[22] Valtteri Niemi,et al. Cryptographic Protocols and Voting , 1994, Results and Trends in Theoretical Computer Science.
[23] Julien P. Stern. A new and efficient all-or-nothing disclosure of secrets protocol , 1998 .
[24] Gilles Brassard,et al. All-or-Nothing Disclosure of Secrets , 1986, CRYPTO.
[25] Jianhong Zhang,et al. Practical t-out-n Oblivious Transfer and Its Applications , 2003, ICICS.
[26] Alexandra Boldyreva,et al. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .
[27] Lila Kari,et al. Secret Selling of Secrets with Several Buyers , 1990, Bull. EATCS.
[28] Gilles Brassard,et al. Information theoretic reductions among disclosure problems , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[29] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[30] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[31] Yi Mu,et al. m out of n Oblivious Transfer , 2002, ACISP.