-
1
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
LNCS 2045
-
B. Aiello, Y. Ishai, and O. Reingold, Priced oblivious transfer: how to sell digital goods, Proc. of EUROCRYPT, LNCS 2045, pp. 119-135, 2001.
-
(2001)
Proc. of EUROCRYPT
, pp. 119-135
-
-
Aiello, B.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
85032877753
-
Non-interactive oblivious transfer and application
-
LNCS 435
-
M. Bellare, and S. Micali, Non-interactive oblivious transfer and application, Proc. of CRYPTO, LNCS 435, pp. 547-557, 1989.
-
(1989)
Proc. of CRYPTO
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
3
-
-
0022864717
-
Information theoretic reductions among disclosure problems
-
G. Brassard, C. Crepeau, and J. M. Robert, Information theoretic reductions among disclosure problems, Proc. of the 27th Annual Symposium on Foundations of Computer Science, pp. 168-173, 1986.
-
(1986)
Proc. of the 27th Annual Symposium On Foundations of Computer Science
, pp. 168-173
-
-
Brassard, G.1
Crepeau, C.2
Robert, J.M.3
-
4
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, A logic of authentication, ACM Trans. Computer Systems, vol. 8, no. 1, pp. 18-36, 1990.
-
(1990)
ACM Trans. Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
5
-
-
84957712978
-
On the foundations of oblivious transfer
-
LNCS 1403
-
C. Cachin, On the foundations of oblivious transfer, Proc. of EUROCRYPT, LNCS 1403, pp. 361-374, 1998.
-
(1998)
Proc. of EUROCRYPT
, pp. 361-374
-
-
Cachin, C.1
-
6
-
-
80051636706
-
Single database private information retrieval implies oblivious transfer
-
LNCS 1807
-
G. D. Crescenzo, T. MalkinOn, and R. Ostrovsky, Single database private information retrieval implies oblivious transfer, Proc. of EUROCRYPT, LNCS 1807, pp. 122-138, 2000.
-
(2000)
Proc. of EUROCRYPT
, pp. 122-138
-
-
Crescenzo, G.D.1
Malkinon, T.2
Ostrovsky, R.3
-
7
-
-
9544230687
-
A fast modular square computing method based on the generalized Chinese remainder theorem for prime module
-
C. C. Chang, and Y. P. Lai, A fast modular square computing method based on the generalized Chinese remainder theorem for prime module, Journal of Applied Mathematics and Computation, vol. 161, no. 1, pp. 181-194, 2005.
-
(2005)
Journal of Applied Mathematics and Computation
, vol.161
, Issue.1
, pp. 181-194
-
-
Chang, C.C.1
Lai, Y.P.2
-
8
-
-
0027614601
-
A new generalized group-oriented cryptoscheme without trusted centers
-
C. C. Chang, and H. C. Lee, A new generalized group-oriented cryptoscheme without trusted centers, IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 725-729, 2006.
-
(2006)
IEEE Journal On Selected Areas In Communications
, vol.11
, Issue.5
, pp. 725-729
-
-
Chang, C.C.1
Lee, H.C.2
-
9
-
-
56149118070
-
Robust t-out-of-n oblivious transfer mechanism based on CRT
-
C. C. Chang, and J. S. Lee, Robust t-out-of-n oblivious transfer mechanism based on CRT, Journal of Network and Computer Applications, vol. 32, no. 1, pp. 226-235, 2009.
-
(2009)
Journal of Network and Computer Applications
, vol.32
, Issue.1
, pp. 226-235
-
-
Chang, C.C.1
Lee, J.S.2
-
10
-
-
77951858876
-
Generalized Aryabhata remainder theorem
-
C. C. Chang, J. S. Yeh, and J. H. Yang, Generalized Aryabhata remainder theorem, International Journal of Innovative Computing, Information and Control, vol. 6, no. 4, pp. 1865-1871, 2010.
-
(2010)
International Journal of Innovative Computing, Information and Control
, vol.6
, Issue.4
, pp. 1865-1871
-
-
Chang, C.C.1
Yeh, J.S.2
Yang, J.H.3
-
11
-
-
84880895217
-
Oblivious transfer in the bounded storage model
-
LNCS 2139
-
Y. Z. Ding, Oblivious transfer in the bounded storage model, Proc. of CRYPTO, LNCS 2139, pp. 155-170, 2001.
-
(2001)
Proc. of CRYPTO
, pp. 155-170
-
-
Ding, Y.Z.1
-
12
-
-
84957611040
-
Lower bounds for oblivious transfer reductions
-
LNCS 1592
-
Y. Dodis, and S. Micali, Lower bounds for oblivious transfer reductions, Proc. of EUROCRYPT, LNCS 1592, pp. 42-55, 1999.
-
(1999)
Proc. of EUROCRYPT
, pp. 42-55
-
-
Dodis, Y.1
Micali, S.2
-
13
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel, A randomized protocol for signing contracts, Communications of the ACM, vol. 28, no. 6, pp. 637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
16
-
-
0042831199
-
Parallel computational algorithms for generalized Chinese remainder theorem
-
Y. P. Lai, and C. C. Chang, Parallel computational algorithms for generalized Chinese remainder theorem, Journal of Computers and Electrical Engineering, vol. 29, no. 8, pp. 801-811, 2003.
-
(2003)
Journal of Computers and Electrical Engineering
, vol.29
, Issue.8
, pp. 801-811
-
-
Lai, Y.P.1
Chang, C.C.2
-
17
-
-
84896054573
-
Choosing t-out-of-n secrets by oblivious transfer
-
J. S. Lee, and C. C. Chang, Choosing t-out-of-n secrets by oblivious transfer, Journal of INFORMATION & SECURITY, vol. 18, no. 8, pp. 67-84, 2006.
-
(2006)
Journal of INFORMATION & SECURITY
, vol.18
, Issue.8
, pp. 67-84
-
-
Lee, J.S.1
Chang, C.C.2
-
18
-
-
0040912354
-
On the security of fair blind signature scheme using oblivious transfer
-
N. Y. Lee, and T. Hwang, On the security of fair blind signature scheme using oblivious transfer, Journal of Computer Communications, vol. 22, no. 3, pp. 287-290, 1999.
-
(1999)
Journal of Computer Communications
, vol.22
, Issue.3
, pp. 287-290
-
-
Lee, N.Y.1
Hwang, T.2
-
21
-
-
0003462641
-
-
Technical Report TR-81, Aiken Computation Laboratory, Harvard University, USA
-
M. O. Rabin, How to exchange secrets by oblivious transfer, Technical Report TR-81, Aiken Computation Laboratory, Harvard University, USA, 1981.
-
(1981)
How to Exchange Secrets By Oblivious Transfer
-
-
Rabin, M.O.1
-
22
-
-
33746896589
-
Aryabhata remainder theorem: Relevance to public-key Cryptoalgorithms
-
T. R. N. Rao, and C. H. Yang, Aryabhata remainder theorem: relevance to public-key Cryptoalgorithms, Journal of Circuits, Systems and Signal Processing, vol. 25, no. 1, pp. 1-5, 2004.
-
(2004)
Journal of Circuits, Systems and Signal Processing
, vol.25
, Issue.1
, pp. 1-5
-
-
Rao, T.R.N.1
Yang, C.H.2
-
23
-
-
1342345050
-
Efficient 1-out-of-n oblivious transfer protocols with universally usable parameter
-
W. G. Tzeng, Efficient 1-out-of-n oblivious transfer protocols with universally usable parameter, IEEE Trans. Computers, vol. 53, no. 2, pp. 232-240, 2004.
-
(2004)
IEEE Trans. Computers
, vol.53
, Issue.2
, pp. 232-240
-
-
Tzeng, W.G.1
-
24
-
-
0842310308
-
K-out-of-n oblivious transfer without random oracles
-
O. Wakaha, and S. Ryota, K-out-of-n oblivious transfer without random oracles, Journal of IEICE Trans Fundam Electron Commun Comput Sci, vol. E87-A, no. 1, pp. 147-151, 2004.
-
(2004)
Journal of IEICE Trans Fundam Electron Commun Comput Sci
, vol.E87-A
, Issue.1
, pp. 147-151
-
-
Wakaha, O.1
Ryota, S.2
-
25
-
-
0142218971
-
Practical t-out-n oblivious transfer and its applications
-
LNCS 2836
-
Q. H. Wu, J. H. Zhang, and Y. M. Wang, Practical t-out-n oblivious transfer and its applications, Journal of Information and Communications Security, LNCS 2836, pp. 226-237, 2003.
-
(2003)
Journal of Information and Communications Security
, pp. 226-237
-
-
Wu, Q.H.1
Zhang, J.H.2
Wang, Y.M.3
|