Distributed Oblivious Transfer
暂无分享,去创建一个
[1] Silvio Micali,et al. Non-Interactive Oblivious Transfer and Applications , 1989, CRYPTO.
[2] Gilles Brassard,et al. Oblivious transfers and intersecting codes , 1996, IEEE Trans. Inf. Theory.
[3] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[4] Andrew Odlyzko,et al. Advances in Cryptology — CRYPTO’ 86 , 2000, Lecture Notes in Computer Science.
[5] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[6] Carl Pomerance,et al. Advances in Cryptology — CRYPTO ’87 , 2000, Lecture Notes in Computer Science.
[7] Claude Crépeau,et al. Equivalence Between Two Flavours of Oblivious Transfers , 1987, CRYPTO.
[8] Joe Kilian,et al. Uses of randomness in algorithms and protocols , 1990 .
[9] Oded Goldreich,et al. How to Solve any Protocol Problem - An Efficiency Improvement , 1987, CRYPTO.
[10] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[11] Joe Kilian,et al. Achieving oblivious transfer using weakened security assumptions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[12] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[13] InitializerRonald L. RivestLaboratory. Unconditionally Secure Commitment and Oblivious Transfer Schemes Using Private Channels and a Trusted Initializer , 1999 .
[14] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[15] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[16] Donald Beaver,et al. Commodity-based cryptography (extended abstract) , 1997, STOC '97.
[17] Christian Cachin. On the Foundations of Oblivious Transfer , 1998, EUROCRYPT.
[18] Gilles Brassard,et al. All-or-Nothing Disclosure of Secrets , 1986, CRYPTO.
[19] Moni Naor,et al. Access Control and Signatures via Quorum Secret Sharing , 1998, IEEE Trans. Parallel Distributed Syst..
[20] Russell Impagliazzo,et al. Limits on the provable consequences of one-way permutations , 1988, STOC '89.
[21] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[22] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[23] Tal Malkin,et al. A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication , 1998, RANDOM.
[24] Gilles Brassard,et al. Information theoretic reductions among disclosure problems , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).