1. Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computational Laboratory (1981)
2. Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Comm. ACM 28 (6), 637–647 (1985)
3. Crépeau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions (extended abstract). In: Proceedings of the 29th Symposium on Foundations of Computer Science, pp 42–52. IEEE Press, Piscataway (1988)
4. Crépeau, C.: Equivalence between two flavors of oblivious transfers. In: Advances in Cryptology: Proceedings of Crypto’87, pp 350–354. Springer (1988)
5. Yao, A.C.: Protocols for secure computation. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, pp 160–164. IEEE Computer Society, Washington (1982)