메뉴 건너뛰기




Volumn 2836, Issue , 2003, Pages 226-237

Practical t-out-n oblivious transfer and its applications

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; COMPUTERS;

EID: 0142218971     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-39927-8_21     Document Type: Article
Times cited : (21)

References (22)
  • 1
    • 3042545539 scopus 로고    scopus 로고
    • 1-Out-of-n Signatures from a Variety of Keys
    • M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n Signatures from a Variety of Keys. ASIACRYPT'02, 2002, pages 415-432, 2002.
    • (2002) ASIACRYPT'02 , vol.2002 , pp. 415-432
    • Abe, M.1    Ohkubo, M.2    Suzuki, K.3
  • 2
    • 84957360961 scopus 로고    scopus 로고
    • Oblivious Transfers and Privacy Amplification
    • G. Brassard, C. Crépeau. Oblivious Transfers and Privacy Amplification. EUROCRYPT'97, pages 334-346, 1997.
    • (1997) EUROCRYPT'97 , pp. 334-346
    • Brassard, G.1    Crépeau, C.2
  • 3
    • 84959049489 scopus 로고    scopus 로고
    • An Efficient and Practical Scheme for Privacy Protection in E-commerce of Digital Goods
    • F. Bao, R. Deng, P. Feng. An Efficient and Practical Scheme for Privacy Protection in E-commerce of Digital Goods. ICICS'03, pages 162-170. 2000.
    • (2000) ICICS'03 , pp. 162-170
    • Bao, F.1    Deng, R.2    Feng, P.3
  • 5
    • 0030283655 scopus 로고    scopus 로고
    • Oblivious Transfer and Intersecting Codes
    • coding and complexity
    • G. Brassard, C. Crepeau, M. Santha. Oblivious Transfer and Intersecting Codes. IEEE Trans. on Inf. Th., special issue in coding and complexity, Vol. 42, No. 6, pages 1769-1780, 1996.
    • (1996) IEEE Trans. on Inf. Th. , vol.42 , Issue.6 SPEC. ISSUE , pp. 1769-1780
    • Brassard, G.1    Crepeau, C.2    Santha, M.3
  • 7
    • 85016672373 scopus 로고
    • Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
    • R. Cramer, I. Damgard, and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. CRYPTO'94, pages 174-187, 1994.
    • (1994) CRYPTO'94 , pp. 174-187
    • Cramer, R.1    Damgard, I.2    Schoenmakers, B.3
  • 9
    • 84990195007 scopus 로고
    • Transferred Cash Grows in Size
    • D. Chaum and T. Pedersen. Transferred Cash Grows in Size. EUROCRYPT'92, pages 390-407, 1993.
    • (1993) EUROCRYPT'92 , pp. 390-407
    • Chaum, D.1    Pedersen, T.2
  • 10
    • 85010651974 scopus 로고
    • A Knapsack Type Public-key Cryptosystem Based on Arithmetic in Finite Field
    • B. Chor, R. L. Rivest. A Knapsack Type Public-key Cryptosystem Based on Arithmetic in Finite Field. CRYPTO'84, pages 54-65, 1985.
    • (1985) CRYPTO'84 , pp. 54-65
    • Chor, B.1    Rivest, R.L.2
  • 12
    • 85032194875 scopus 로고
    • How to Solve any Protocol Problem: An Efficient Improvement
    • O. Goldreich, R. Vainish. How to Solve any Protocol Problem: An Efficient Improvement. CRYPTO'87, pages 73-86, 1988.
    • (1988) CRYPTO'87 , pp. 73-86
    • Goldreich, O.1    Vainish, R.2
  • 15
    • 0018019325 scopus 로고
    • Hiding Information and Signatures in Trapdoor Knapsack
    • R. C. Merkle, and M. Hellman. Hiding Information and Signatures in Trapdoor Knapsack. IEEE Transactions on Information Theory, Vol.24, No.5, pages 525-530, 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.5 , pp. 525-530
    • Merkle, R.C.1    Hellman, M.2
  • 16
    • 84937422114 scopus 로고    scopus 로고
    • Distributed Oblivious Transfer
    • M. Naor, B. Pinkas. Distributed Oblivious Transfer. ASIACRYPT'00, pages 205-219, 2000.
    • (2000) ASIACRYPT'00 , pp. 205-219
    • Naor, M.1    Pinkas, B.2
  • 17
    • 0003462641 scopus 로고
    • Technical Report TR-81, Aiken Computation Laboratory, Harvard University
    • M. Rabin. How to Exchange Secrets by Oblivious Transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University, 1981.
    • (1981) How to Exchange Secrets by Oblivious Transfer
    • Rabin, M.1
  • 18
    • 0019016485 scopus 로고
    • On the Security of the Merkle-Hellman Cryptographic Scheme
    • May
    • A. Shamir, and A. Fiat. On the Security of the Merkle-Hellman Cryptographic Scheme. IEEE Trans. On Information Theory, Vol.26, No.3, pages 339-340, May 1980.
    • (1980) IEEE Trans. on Information Theory , vol.26 , Issue.3 , pp. 339-340
    • Shamir, A.1    Fiat, A.2
  • 19
    • 84947772655 scopus 로고    scopus 로고
    • A New and Efficient All-or-nothing Disclosure of Secrets Protocol
    • J. P. Stern. A New and Efficient All-or-nothing Disclosure of Secrets Protocol. ASIACRYPT'98, pages 357-371, 1998.
    • (1998) ASIACRYPT'98 , pp. 357-371
    • Stern, J.P.1
  • 20
    • 0011195914 scopus 로고
    • Secret Selling of Secrets with Several Buyers
    • A. Salomaa, L. Santean. Secret Selling of Secrets with Several Buyers. 42nd EATCS Bulletin, pages 178-186, 1990.
    • (1990) 42nd EATCS Bulletin , pp. 178-186
    • Salomaa, A.1    Santean, L.2
  • 21
    • 84958985031 scopus 로고    scopus 로고
    • Efficient 1-out-of-n Oblivious Transfer Schemes
    • W. Tzeng. Efficient 1-out-of-n Oblivious Transfer Schemes. PKC'02, pages 159-171, 2002.
    • (2002) PKC'02 , pp. 159-171
    • Tzeng, W.1
  • 22
    • 84957701870 scopus 로고    scopus 로고
    • Cryptanalysis of the Chor-Rivest Cryptosystem
    • S. Vaudenay. Cryptanalysis of the Chor-Rivest Cryptosystem. CRYPTO'98, pages 243-256, 1998.
    • (1998) CRYPTO'98 , pp. 243-256
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.