메뉴 건너뛰기




Volumn 1592, Issue , 1999, Pages 42-55

Lower bounds for oblivious transfer reductions

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION THEORY;

EID: 84957611040     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48910-X_4     Document Type: Conference Paper
Times cited : (37)

References (17)
  • 2
    • 84976804419 scopus 로고
    • How to Exchange (Secret) Keys
    • May
    • M. Blum. How to Exchange (Secret) Keys. In ACM Transactions of Computer Systems, vol. 1, No. 2, pp. 175-193, May 1983.
    • (1983) ACM Transactions of Computer Systems , vol.1 , Issue.2 , pp. 175-193
    • Blum, M.1
  • 7
    • 84945299518 scopus 로고
    • A zero-knowledge poker protocol that achieves confidentiality of the players' strategy or how to achieve an electronic poker face
    • Springer-Verlag
    • C. Cr_epeau. A zero-knowledge poker protocol that achieves confidentiality of the players' strategy or how to achieve an electronic poker face. In Advances in Cryptology: Proceedings of Crypto '86, pp. 239-247. Springer-Verlag, 1987.
    • (1987) Advances in Cryptology: Proceedings of Crypto '86 , pp. 239-247
    • Cr_Epeau, C.1
  • 10
    • 0004809522 scopus 로고    scopus 로고
    • A Secure Protocol for the Oblivious Transfer
    • M. Fisher, S. Micali, C. Racko_. A Secure Protocol for the Oblivious Transfer. In Journal of Cryptology, vol. 9, No. 3 pp. 191-195, 1996.
    • (1996) Journal of Cryptology , vol.9 , Issue.3 , pp. 191-195
    • Fisher, M.1    Micali, S.2    Racko_, C.3
  • 12
  • 16
    • 0026237211 scopus 로고
    • Secret ballot elections in computer networks
    • H. Nurmi, A. Salomaa, L. Santean. Secret ballot elections in computer networks. In Computer and Security, volume 10, No. 6, pp. 553-560, 1991.
    • (1991) Computer and Security , vol.10 , Issue.6 , pp. 553-560
    • Nurmi, H.1    Salomaa, A.2    Santean, L.3
  • 17
    • 0003462641 scopus 로고
    • How to Exchange Secrets by Oblivious Transfer
    • Aiken Computation Laboratory, Harvard University
    • M. Rabin. How to Exchange Secrets by Oblivious Transfer. In Technical Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981.
    • (1981) Technical Memo TR-81
    • Rabin, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.