메뉴 건너뛰기




Volumn 2501, Issue , 2002, Pages 143-149

Efficient oblivious transfer in the bounded-storage model

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 84958744545     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36178-2_9     Document Type: Conference Paper
Times cited : (7)

References (21)
  • 3
    • 84958598231 scopus 로고    scopus 로고
    • Unconditional security against memory-bounded adversaries
    • C. Cachin and U. Maurer, Unconditional security against memory-bounded adversaries, In Advances in Cryptology - CRYPTO’97, pp. 292-306, 1997.
    • (1997) Advances in Cryptology - CRYPTO’97 , pp. 292-306
    • Cachin, C.1    Maurer, U.2
  • 6
    • 0342980131 scopus 로고
    • Equivalence between two flavours of oblivious transter
    • C. Crépeau, Equivalence between two flavours of oblivious transter, In Advances in Cryptology - CRYPTO’87, pp. 351-368, 1987.
    • (1987) Advances in Cryptology - CRYPTO’87 , pp. 351-368
    • Crépeau, C.1
  • 9
    • 84969353286 scopus 로고
    • On the reversibility of oblivious transter and private multi-party computations
    • C. Crépeau and M. Santha, On the reversibility of oblivious transter and private multi-party computations, In Advances in Cryptology - CRYPTO’95, pp. 110-123, 1995.
    • (1995) Advances in Cryptology - CRYPTO’95 , pp. 110-123
    • Crépeau, C.1    Santha, M.2
  • 10
    • 84880895217 scopus 로고    scopus 로고
    • Oblivious Transfer in the Bounded Storage Model
    • Y. Z. Ding, Oblivious Transfer in the Bounded Storage Model, In Advances in Cryptology - CRYPTO 2001, pp. 155-170, 2001.
    • (2001) Advances in Cryptology - CRYPTO 2001 , pp. 155-170
    • Ding, Y.Z.1
  • 15
    • 0141544069 scopus 로고    scopus 로고
    • Perfect sero-knowledge arguments for NP using any one-way function
    • Preliminary version presented at CRYPTO’92
    • M. Naor, R. Ostrovsky, R. Venkatesan, and M. Yung, Perfect sero-knowledge arguments for NP using any one-way function, Journal of Cryptology, 11(2), pp. 87-108, 1998. Preliminary version presented at CRYPTO’92.
    • (1998) Journal of Cryptology , vol.11 , Issue.2 , pp. 87-108
    • Naor, M.1    Ostrovsky, R.2    Venkatesan, R.3    Yung, M.4
  • 17
    • 0020829007 scopus 로고
    • Transaction Protection by Beacons
    • M. O. Rabin, Transaction Protection by Beacons, JCSS 27(2), pp. 256-267, 1983.
    • (1983) JCSS , vol.27 , Issue.2 , pp. 256-267
    • Rabin, M.O.1
  • 18
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • P. W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Computing, 26(5), pp. 1484-1509, 1997.
    • (1997) SIAM J. Computing , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.W.1
  • 19
    • 0842305624 scopus 로고    scopus 로고
    • On the connections between universal hasing, combinatorial designs and error-correcting codes
    • D. R. Stinson, On the connections between universal hasing, combinatorial designs and error-correcting codes, Congressus Numerantium 114, pp. 7-27, 1996.
    • (1996) Congressus Numerantium , vol.114 , pp. 7-27
    • Stinson, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.