메뉴 건너뛰기




Volumn E87-A, Issue 1, 2004, Pages 141-146

How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer

Author keywords

Diffie Hellman assumption; Oblivious transfer

Indexed keywords

COMPUTER SIMULATION; FUNCTION EVALUATION; INFORMATION ANALYSIS; INFORMATION THEORY; MATHEMATICAL MODELS; RANDOM PROCESSES; SECURITY OF DATA; THEOREM PROVING;

EID: 0842267125     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (13)
  • 1
    • 0842283854 scopus 로고    scopus 로고
    • Randomness reuse in multi-recipient encryption scheme
    • Proc. PKC'03
    • M. Bellare, A. Boldyreva, and J. Staddon, "Randomness reuse in multi-recipient encryption scheme," Proc. PKC'03, LNCS, vol.2567, pp.85-99, 2003.
    • (2003) LNCS , vol.2567 , pp. 85-99
    • Bellare, M.1    Boldyreva, A.2    Staddon, J.3
  • 3
    • 84888252697 scopus 로고
    • All-or-nothing disclosure of secrets
    • Proc. Crypto'86
    • G. Brassard, C. Crépeau, and J.M. Robert, "All-or-nothing disclosure of secrets," Proc. Crypto'86, LNCS, vol.263, pp.234-238, 1987.
    • (1987) LNCS , vol.263 , pp. 234-238
    • Brassard, G.1    Crépeau, C.2    Robert, J.M.3
  • 4
    • 84957712978 scopus 로고    scopus 로고
    • On the foundations of oblivious transfer
    • Proc. Eurocrypt'98
    • C. Cachin, "On the foundations of oblivious transfer," Proc. Eurocrypt'98, LNCS, vol.1403, pp.361-374, 1998.
    • (1998) LNCS , vol.1403 , pp. 361-374
    • Cachin, C.1
  • 5
    • 85030121757 scopus 로고
    • Equivalence between two flavors of oblivious transfers
    • Proc. Crypto'87
    • C. Crépeau, "Equivalence between two flavors of oblivious transfers," Proc. Crypto'87, LNCS, vol.293, pp.350-354, 1988.
    • (1988) LNCS , vol.293 , pp. 350-354
    • Crépeau, C.1
  • 6
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts," Commun. ACM, vol.28, pp.637-647, 1985.
    • (1985) Commun. ACM , vol.28 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 7
    • 85032194875 scopus 로고
    • How to solve any protocol problem: An efficient improvement
    • Proc. Crypto'87
    • O. Goldreich and R. Vainish, "How to solve any protocol problem: An efficient improvement," Proc. Crypto'87, LNCS. vol.293, pp.73-86, 1988.
    • (1988) LNCS , vol.293 , pp. 73-86
    • Goldreich, O.1    Vainish, R.2
  • 9
    • 84958971364 scopus 로고    scopus 로고
    • Multi-recipient public-key encryption with shortened ciphertext
    • Proc. PKC'02
    • K. Kurosawa, "Multi-recipient public-key encryption with shortened ciphertext," Proc. PKC'02, LNCS, vol.2274, pp.48-63, 2002.
    • (2002) LNCS , vol.2274 , pp. 48-63
    • Kurosawa, K.1
  • 12
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Aiken Computation Lab., Harvard University
    • M. Rabin, "How to exchange secrets by oblivious transfer," Technical Report TR 81, Aiken Computation Lab., Harvard University, 1981.
    • (1981) Technical Report TR 81
    • Rabin, M.1
  • 13
    • 84958985031 scopus 로고    scopus 로고
    • Efficient 1-out-n oblivious transfer schemes
    • Proc. PKC'02
    • W.G. Tzeng, "Efficient 1-out-n oblivious transfer schemes," Proc. PKC'02, LNCS, vol.2274, pp.159-171, 2002.
    • (2002) LNCS , vol.2274 , pp. 159-171
    • Tzeng, W.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.