Strengthening the Security of Distributed Oblivious Transfer
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[3] Claude Crépeau,et al. Equivalence Between Two Flavours of Oblivious Transfers , 1987, CRYPTO.
[4] Claude Crépeau,et al. Optimal Reductions Between Oblivious Transfers Using Interactive Hashing , 2006, EUROCRYPT.
[5] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[6] Hossein Ghodosi. On insecurity of Naor-Pinkas' distributed oblivious transfer , 2007, Inf. Process. Lett..
[7] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[8] Alfredo De Santis,et al. On Unconditionally Secure Distributed Oblivious Transfer , 2007, Journal of Cryptology.
[9] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[10] Gilles Brassard,et al. Oblivious transfers and intersecting codes , 1996, IEEE Trans. Inf. Theory.
[11] Gilles Brassard,et al. Oblivious Transfers and Privacy Amplification , 1997, Journal of Cryptology.
[12] Joos Vandewalle,et al. On Unconditionally Secure Distributed Oblivious Transfer , 2002, INDOCRYPT.
[13] Moni Naor,et al. Distributed Oblivious Transfer , 2000, ASIACRYPT.