-
1
-
-
84945134014
-
Priced oblivious transfer: how to sell digital goods
-
Aiello B., Ishai Y., and Reingold O. Priced oblivious transfer: how to sell digital goods. Proceedings of advances in EUROCRYPT'01, Aarhus, Denmark, May 21-23 (2001) 119-135
-
(2001)
Proceedings of advances in EUROCRYPT'01, Aarhus, Denmark, May 21-23
, pp. 119-135
-
-
Aiello, B.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
85032877753
-
Non-interactive oblivious transfer and applications
-
Bellare M., and Micali S. Non-interactive oblivious transfer and applications. Proc Adv Crypto'89 vol. 435 (1990) 547-557
-
(1990)
Proc Adv Crypto'89
, vol.435
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
5
-
-
9544230687
-
A fast modular square computing method based on the generalized Chinese remainder theorem for prime module
-
Chang C.C., and Lai Y.P. A fast modular square computing method based on the generalized Chinese remainder theorem for prime module. Appl Math Comput 161 1 (2005) 181-194
-
(2005)
Appl Math Comput
, vol.161
, Issue.1
, pp. 181-194
-
-
Chang, C.C.1
Lai, Y.P.2
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
Chaum D. Untraceable electronic mail, return addresses and digital pseudonyms. Commun ACM 24 2 (1981) 84-88
-
(1981)
Commun ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
8
-
-
80051636706
-
Single database private information retrieval implies oblivious transfer
-
Crescenzo G.D., Malkin T., and Ostrovsky R. Single database private information retrieval implies oblivious transfer. Proceedings of advances in EUROCRYPT'00, Bruges, Belgium, May (2000) 122-138
-
(2000)
Proceedings of advances in EUROCRYPT'00, Bruges, Belgium, May
, pp. 122-138
-
-
Crescenzo, G.D.1
Malkin, T.2
Ostrovsky, R.3
-
10
-
-
84880895217
-
Oblivious transfer in the bounded storage model
-
Ding Y.Z. Oblivious transfer in the bounded storage model. Proceedings of advances in Crypto'01, Santa Barbara, CA, USA, August (2001) 155-170
-
(2001)
Proceedings of advances in Crypto'01, Santa Barbara, CA, USA, August
, pp. 155-170
-
-
Ding, Y.Z.1
-
11
-
-
84957611040
-
Lower bounds for oblivious transfer reductions
-
Dodis Y., and Micali S. Lower bounds for oblivious transfer reductions. Proceedings of advances in Crypto'99, Santa Barbara, CA, USA, August (1999) 42-45
-
(1999)
Proceedings of advances in Crypto'99, Santa Barbara, CA, USA, August
, pp. 42-45
-
-
Dodis, Y.1
Micali, S.2
-
12
-
-
84874800178
-
A public-key cryptosystem and a signature protocol based on discrete logarithms
-
ElGamal T. A public-key cryptosystem and a signature protocol based on discrete logarithms. IEEE Trans Inf Theory 31 4 (1985) 469-472
-
(1985)
IEEE Trans Inf Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
13
-
-
0022080529
-
A randomized protocol for signing contracts
-
Even S., Goldreich O., and Lempel A. A randomized protocol for signing contracts. Commun ACM (1985) 637-647
-
(1985)
Commun ACM
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
14
-
-
0034510467
-
Concurrent oblivious transfer
-
Garay J.A., and MacKenzie P.D. Concurrent oblivious transfer. Proceedings of the 41st symposium on foundations of computer science, Redondo Beach, CA, USA (2000) 314-324
-
(2000)
Proceedings of the 41st symposium on foundations of computer science, Redondo Beach, CA, USA
, pp. 314-324
-
-
Garay, J.A.1
MacKenzie, P.D.2
-
17
-
-
0842267125
-
How to design efficient multiple-use 1-out-of-n oblivious transfer
-
Kurosawa K., and Duong Q.V. How to design efficient multiple-use 1-out-of-n oblivious transfer. IEICE Trans Fund Electron Commun, Comput Sci E87-A 1 (2004) 141-146
-
(2004)
IEICE Trans Fund Electron Commun, Comput Sci
, vol.E87-A
, Issue.1
, pp. 141-146
-
-
Kurosawa, K.1
Duong, Q.V.2
-
18
-
-
0040912354
-
On the security of blind signature protocol using oblivious transfer
-
Lee N.Y., and Hwang T. On the security of blind signature protocol using oblivious transfer. Comput Commun (1999) 287-290
-
(1999)
Comput Commun
, pp. 287-290
-
-
Lee, N.Y.1
Hwang, T.2
-
19
-
-
0038059207
-
Robust non-interactive oblivious transfer
-
Mu Y., Zhang J., Varadharajan V., and Lin Y.X. Robust non-interactive oblivious transfer. IEEE Commun Lett 7 4 (2003) 153-155
-
(2003)
IEEE Commun Lett
, vol.7
, Issue.4
, pp. 153-155
-
-
Mu, Y.1
Zhang, J.2
Varadharajan, V.3
Lin, Y.X.4
-
20
-
-
84957096920
-
Oblivious transfer with adaptive queries
-
Naor M., and Pinkas B. Oblivious transfer with adaptive queries. Proceedings of advances in Crypto'99, Santa Barbara, CA, USA, August (1999) 573-590
-
(1999)
Proceedings of advances in Crypto'99, Santa Barbara, CA, USA, August
, pp. 573-590
-
-
Naor, M.1
Pinkas, B.2
-
22
-
-
84937422114
-
Distributed oblivious transfer
-
Naor M., and Pinkas B. Distributed oblivious transfer. Proceedings of advances in Asiacrypt'00, Kyoto, Japan, December (2000) 205-219
-
(2000)
Proceedings of advances in Asiacrypt'00, Kyoto, Japan, December
, pp. 205-219
-
-
Naor, M.1
Pinkas, B.2
-
24
-
-
56149096286
-
-
Rabin M. How to exchange secrets by oblivious transfer. Technical report, Aiken Computation Laboratory, Harvard University, 1981.
-
Rabin M. How to exchange secrets by oblivious transfer. Technical report, Aiken Computation Laboratory, Harvard University, 1981.
-
-
-
-
25
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21 2 (1977) 120-126
-
(1977)
Commun ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
26
-
-
1342345050
-
Efficient 1-out-of-n oblivious transfer protocols with universally usable parameter
-
Tzeng W.G. Efficient 1-out-of-n oblivious transfer protocols with universally usable parameter. IEEE Trans Comput 53 2 (2004) 232-240
-
(2004)
IEEE Trans Comput
, vol.53
, Issue.2
, pp. 232-240
-
-
Tzeng, W.G.1
|