메뉴 건너뛰기




Volumn 32, Issue 1, 2009, Pages 226-235

Robust t-out-of-n oblivious transfer mechanism based on CRT

Author keywords

Blind signature; Communication; CRT; Oblivious transfer; Privacy

Indexed keywords

COMMUNICATION; CRYPTOGRAPHY; ELECTRONIC COMMERCE; FLUORESCENT SCREENS; TELEPHONE EXCHANGES;

EID: 56149118070     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2008.03.004     Document Type: Article
Times cited : (23)

References (27)
  • 2
    • 85032877753 scopus 로고
    • Non-interactive oblivious transfer and applications
    • Bellare M., and Micali S. Non-interactive oblivious transfer and applications. Proc Adv Crypto'89 vol. 435 (1990) 547-557
    • (1990) Proc Adv Crypto'89 , vol.435 , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 5
    • 9544230687 scopus 로고    scopus 로고
    • A fast modular square computing method based on the generalized Chinese remainder theorem for prime module
    • Chang C.C., and Lai Y.P. A fast modular square computing method based on the generalized Chinese remainder theorem for prime module. Appl Math Comput 161 1 (2005) 181-194
    • (2005) Appl Math Comput , vol.161 , Issue.1 , pp. 181-194
    • Chang, C.C.1    Lai, Y.P.2
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms
    • Chaum D. Untraceable electronic mail, return addresses and digital pseudonyms. Commun ACM 24 2 (1981) 84-88
    • (1981) Commun ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 12
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature protocol based on discrete logarithms
    • ElGamal T. A public-key cryptosystem and a signature protocol based on discrete logarithms. IEEE Trans Inf Theory 31 4 (1985) 469-472
    • (1985) IEEE Trans Inf Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 13
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • Even S., Goldreich O., and Lempel A. A randomized protocol for signing contracts. Commun ACM (1985) 637-647
    • (1985) Commun ACM , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 17
    • 0842267125 scopus 로고    scopus 로고
    • How to design efficient multiple-use 1-out-of-n oblivious transfer
    • Kurosawa K., and Duong Q.V. How to design efficient multiple-use 1-out-of-n oblivious transfer. IEICE Trans Fund Electron Commun, Comput Sci E87-A 1 (2004) 141-146
    • (2004) IEICE Trans Fund Electron Commun, Comput Sci , vol.E87-A , Issue.1 , pp. 141-146
    • Kurosawa, K.1    Duong, Q.V.2
  • 18
    • 0040912354 scopus 로고    scopus 로고
    • On the security of blind signature protocol using oblivious transfer
    • Lee N.Y., and Hwang T. On the security of blind signature protocol using oblivious transfer. Comput Commun (1999) 287-290
    • (1999) Comput Commun , pp. 287-290
    • Lee, N.Y.1    Hwang, T.2
  • 24
    • 56149096286 scopus 로고    scopus 로고
    • Rabin M. How to exchange secrets by oblivious transfer. Technical report, Aiken Computation Laboratory, Harvard University, 1981.
    • Rabin M. How to exchange secrets by oblivious transfer. Technical report, Aiken Computation Laboratory, Harvard University, 1981.
  • 25
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21 2 (1977) 120-126
    • (1977) Commun ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 26
    • 1342345050 scopus 로고    scopus 로고
    • Efficient 1-out-of-n oblivious transfer protocols with universally usable parameter
    • Tzeng W.G. Efficient 1-out-of-n oblivious transfer protocols with universally usable parameter. IEEE Trans Comput 53 2 (2004) 232-240
    • (2004) IEEE Trans Comput , vol.53 , Issue.2 , pp. 232-240
    • Tzeng, W.G.1
  • 27


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.