Computationally Secure Oblivious Transfer
暂无分享,去创建一个
[1] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[2] János Komlós,et al. Storing a sparse table with O(1) worst case access time , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[3] Gilles Brassard,et al. Oblivious transfers and intersecting codes , 1996, IEEE Trans. Inf. Theory.
[4] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[5] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[6] Moni Naor,et al. Communication preserving protocols for secure function evaluation , 2001, STOC '01.
[7] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[8] Christian Cachin. On the Foundations of Oblivious Transfer , 1998, EUROCRYPT.
[9] Donald Beaver,et al. Foundations of Secure Interactive Computing , 1991, CRYPTO.
[10] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[11] Moni Naor,et al. Magic functions , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[12] Gilles Brassard,et al. Information theoretic reductions among disclosure problems , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[13] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[14] Rajeev Motwani,et al. Randomized algorithms , 1996, CSUR.
[15] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[16] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[17] Joe Kilian,et al. Uses of randomness in algorithms and protocols , 1990 .
[18] Silvio Micali,et al. Lower Bounds for Oblivious Transfer Reductions , 1999, EUROCRYPT.
[19] Russell Impagliazzo,et al. Limits on the Provable Consequences of One-way Permutations , 1988, CRYPTO.
[20] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[21] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[22] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[23] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[24] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[25] Rasmus Pagh. Hash and Displace: Efficient Evaluation of Minimal Perfect Hash Functions , 1999 .
[26] Gilles Brassard,et al. All-or-Nothing Disclosure of Secrets , 1986, CRYPTO.
[27] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[28] Stefan Lucks,et al. Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys , 1997, Security Protocols Workshop.
[29] Moni Naor,et al. Oblivious Polynomial Evaluation , 2006, SIAM J. Comput..
[30] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[31] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[32] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[33] Sampath Kannan,et al. The relationship between public key encryption and oblivious transfer , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[34] Claude Crépeau,et al. Equivalence Between Two Flavours of Oblivious Transfers , 1987, CRYPTO.
[35] Silvio Micali,et al. Non-Interactive Oblivious Transfer and Spplications , 1989, CRYPTO.
[36] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[37] Moni Naor,et al. Bit Commitment Using Pseudo-Randomness , 1989, CRYPTO.
[38] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[39] Oded Goldreich,et al. How to Solve any Protocol Problem - An Efficiency Improvement , 1987, CRYPTO.
[40] Marc Fischlin,et al. Trapdoor commitment schemes and their applications , 2001 .
[41] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[42] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[43] Joe Kilian,et al. Achieving oblivious transfer using weakened security assumptions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[44] Noga Alon,et al. The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.
[45] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[46] David Chaum,et al. Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer , 1991, CRYPTO.
[47] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[48] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[49] Moni Naor,et al. Bit commitment using pseudorandomness , 1989, Journal of Cryptology.
[50] Claude Cripeaut. Equivalence Between Two Flavours of Oblivious Transfers , 1988 .
[51] Andrei Z. Broder,et al. A Technique for Measuring the Relative Size and Overlap of Public Web Search Engines , 1998, Comput. Networks.
[52] Moni Naor,et al. Synthesizers and Their Application to the Parallel Construction of Pseudo-Random Functions , 1999, J. Comput. Syst. Sci..