A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
暂无分享,去创建一个
[1] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[2] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[3] William Stallings,et al. Cryptography and network security , 1998 .
[4] Hossein Ghodosi. On insecurity of Naor-Pinkas' distributed oblivious transfer , 2007, Inf. Process. Lett..
[5] Yi Mu,et al. m out of n Oblivious Transfer , 2002, ACISP.
[6] Kaoru Kurosawa,et al. Oblivious keyword search , 2004, J. Complex..
[7] Geuk Lee,et al. Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment , 2009, Future Gener. Comput. Syst..
[8] Jue-Sam Chou,et al. Mental poker game based on a bit commitment scheme through network , 2002, Comput. Networks.
[9] Jing Qin,et al. Non-interactive Oblivious Transfer Protocols , 2009, 2009 International Forum on Information Technology and Applications.
[10] Wen-Guey Tzeng,et al. Efficient k-out-of-n Oblivious Transfer Schemes , 2005, J. Univers. Comput. Sci..
[11] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[12] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[13] Jianhong Zhang,et al. Two provably secure k-out-of-n oblivious transfer schemes , 2005, Appl. Math. Comput..
[14] Moni Naor,et al. Distributed Oblivious Transfer , 2000, ASIACRYPT.
[15] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[16] Chin-Chen Chang,et al. Robust t-out-of-n oblivious transfer mechanism based on CRT , 2009, J. Netw. Comput. Appl..
[17] Abhishek Parakh. Oblivious Transfer Using Elliptic Curves , 2006 .
[18] Chanathip Namprempre,et al. The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme , 2002, Financial Cryptography.
[19] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[20] Moni Naor,et al. Oblivious Transfer with Adaptive Queries , 1999, CRYPTO.
[21] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[22] Florian Kerschbaum,et al. Privacy-preserving computation of benchmarks on item-level data using RFID , 2010, WiSec '10.
[23] Hossein Ghodosi,et al. Comments on the 'm out of n oblivious transfer' , 2006, Inf. Process. Lett..
[24] Ya-Fen Chang,et al. The Essential Design Principles of Verifiable Non-interactive OT Protocols , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[25] Alexandra Boldyreva,et al. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .
[26] Yael Tauman Kalai,et al. Smooth Projective Hashing and Two-Message Oblivious Transfer , 2005, Journal of Cryptology.
[27] Chin-Chen Chang,et al. A new design for efficient t-out-n oblivious transfer scheme , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[28] Silvio Micali,et al. Non-Interactive Oblivious Transfer and Applications , 1989, CRYPTO.
[29] Abhi Shelat,et al. Simulatable Adaptive Oblivious Transfer , 2007, EUROCRYPT.
[30] Fangguo Zhang,et al. Oblivious transfer with timed-release receiver's privacy , 2011, J. Syst. Softw..
[31] Matthew Green,et al. Blind Identity-Based Encryption and Simulatable Oblivious Transfer , 2007, ASIACRYPT.
[32] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[33] Gilles Brassard,et al. All-or-Nothing Disclosure of Secrets , 1986, CRYPTO.