Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment
暂无分享,去创建一个
[1] Richard Berger,et al. A Provably Secure Oblivious Transfer Protocol , 1985, EUROCRYPT.
[2] Manuel Blum,et al. How to exchange (secret) keys , 1983, TOCS.
[3] Ernest F. Brickell,et al. Gradual and Verifiable Release of a Secret , 1987, CRYPTO.
[4] Richard Cleve,et al. Controlled Gradual Disclosure Schemes for Random Bits and Their Applications , 1989, CRYPTO.
[5] Tom Tedrick,et al. How to Exchange Half a Bit , 1983, CRYPTO.
[6] Donald E. Knuth,et al. The Art of Computer Programming, Volumes 1-3 Boxed Set , 1998 .
[7] David Thomas,et al. The Art in Computer Programming , 2001 .
[8] Adi Shamir,et al. The cryptographic security of truncated linearly related variables , 1985, STOC '85.
[9] Silvio Micali,et al. How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[10] KimSoongohn,et al. Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment , 2009 .
[11] Lein Harn,et al. Noninteractive oblivious transfer , 1990 .
[12] Tom Tedrick,et al. Fair Exchange of Secrets , 1984, CRYPTO.
[13] Lein Harn,et al. On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets , 1991, ASIACRYPT.
[14] Silvio Micali,et al. Non-Interactive Oblivious Transfer and Applications , 1989, CRYPTO.