메뉴 건너뛰기




Volumn 1070, Issue , 1996, Pages 119-130

Equivocable oblivious transfer

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84947800390     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-68339-9_11     Document Type: Conference Paper
Times cited : (4)

References (18)
  • 1
    • 84947271111 scopus 로고
    • How to Break a 'Secure' Oblivious Transfer Protocol
    • Springer-Verlag LNCS 658, [B92]
    • [B92] D. Beaver. "How to Break a 'Secure' Oblivious Transfer Protocol." Advances in Cryptology-Eurocrypt'92 Proceedings, Springer-Verlag LNCS 658, 1993, 285-296.
    • (1993) Advances in Cryptology-Eurocrypt'92 Proceedings , pp. 285-296
    • Beaver, D.1
  • 2
    • 84947992686 scopus 로고    scopus 로고
    • Penn State Univ. Tech Report PSU-CSE-96-031, February 7, [B96]
    • [B96] D. Beaver. "Adaptively Secure Encryption." Penn State Univ. Tech Report PSU-CSE-96-031, February 7, 1996.
    • (1996) Adaptively Secure Encryption
    • Beaver, D.1
  • 3
    • 85048601848 scopus 로고
    • Cryptographic Protocols Provably Secure Against Dynamic Adversaries
    • Springer-Verlag LNCS 658, [BH92]
    • [BH92] D. Beaver, S. Haber. "Cryptographic Protocols Provably Secure Against Dynamic Adversaries." Advances in Cryptology - Eurocrypt'92 Proceedings, Springer-Verlag LNCS 658, 1993, 307-323.
    • (1993) Advances in Cryptology - Eurocrypt'92 Proceedings , pp. 307-323
    • Beaver, D.1    Haber, S.2
  • 4
    • 85032877753 scopus 로고
    • Non-Interactive Oblivious Transfer and Applications
    • Springer-Verlag LNCS 435, [BM89]
    • [BM89] M. Bellare, S. Micali. "Non-Interactive Oblivious Transfer and Applications." Advances in Cryptology - Crypto'89 Proceedings, Springer-Verlag LNCS 435, 1990, 547-557.
    • (1990) Advances in Cryptology - Crypto'89 Proceedings , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 9
    • 85030121757 scopus 로고
    • Equivalence Between Two Flavours of Oblivious Transfers
    • Springer-Verlag LNCS 293, [C87]
    • [C87] C. Crépeau. "Equivalence Between Two Flavours of Oblivious Transfers." Advances in Cryptology - Crypto'87 Proceedings, Springer-Verlag LNCS 293, 1988, 350-354.
    • (1988) Advances in Cryptology - Crypto'87 Proceedings , pp. 350-354
    • Crépeau, C.1
  • 10
    • 33745969728 scopus 로고
    • Oblivious Transfer Protecting Secrecy
    • Springer-Verlag LNCS 547, [Boe91]
    • [Boe91] B. den Boer. "Oblivious Transfer Protecting Secrecy." Advances in Cryptology-Eurocrypt'91 Proceedings, Springer-Verlag LNCS 547, 1991, 31-45.
    • (1991) Advances in Cryptology-Eurocrypt'91 Proceedings , pp. 31-45
    • den Boer, B.1
  • 12
    • 0022080529 scopus 로고
    • A Randomized Protocol for Signing Contracts
    • (Early version:Proceedings of Crypto 1982, Springer-Verlag, 1983, 205-210.) [EGL82]
    • [EGL82] S. Even, O. Goldreich, A. Lempel. "A Randomized Protocol for Signing Contracts." Comm,of the ACM 28:6, 1985, 637-647. (Early version:Proceedings of Crypto 1982, Springer-Verlag, 1983, 205-210.)
    • (1985) Comm,of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 14
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof Systems
    • [GMR89]
    • [GMR89] S. Goldwasser, S. Micali, C. Rackoff. "The Knowledge Complexity of Interactive Proof Systems." SIAM J. on Computing 18:1, 1989, 186-208.
    • (1989) SIAM J. on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 15
    • 0025434177 scopus 로고
    • Noninteractive Oblivious Transfer
    • May, [HL90]
    • [HL90] L. Ham, H. Lin. "Noninteractive Oblivious Transfer." Electronics Letters 26:10, May 1990, 635-636.
    • (1990) Electronics Letters , vol.26 , Issue.10 , pp. 635-636
    • Ham, L.1    Lin, H.2
  • 18
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public Key Cryptosystems
    • [RSA78]
    • [RSA78] R. Rivest, A. Shamir, L. Adleman. "A Method for Obtaining Digital Signatures and Public Key Cryptosystems." Communications of the ACM 21:2, 1978, 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.