Publisher
Springer Science and Business Media LLC
Reference35 articles.
1. Rabin M O 2005 How to exchange secrets with oblivious transfer. IACR Cryptology e-print Archive p. 187
2. Yao A C C 1986 How to generate and exchange secrets. In: Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS), IEEE, pp. 162–167
3. Kushilevitz E and Ostrovsky R 1997 Replication is not needed: single database, computationally-private information retrieval. In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, IEEE, pp. 364–373
4. Freedman M J, Ishai Y, Pinkas B and Reingold O 2005 Keyword search and oblivious pseudorandom functions. In: Proceedings of the Theory of Cryptography Conference. Berlin–Heidelberg: Springer, pp. 303–324
5. Nielsen J B, Nordholt P S, Orlandi C and Burra S S 2012 A new approach to practical active-secure two-party computation. In: Proceedings of the Annual Cryptology Conference. Berlin: Springer, pp. 681–700
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献