Author:
Corniaux Christian L. F.,Ghodosi Hossein
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Beaver, D.: Commodity-based cryptography. In: Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, pp. 446–455. ACM (1997)
2. Beimel, A., Chee, Y.M., Wang, H., Zhang, L.F.: Communication-efficient distributed oblivious transfer. Journal of Computer and System Sciences 78(4), 1142–1157 (2012)
3. Lecture Notes in Computer Science;C.H. Bennett,1992
4. Lecture Notes in Computer Science;C. Blundo,2003
5. Blundo, C., D’Arco, P., De Santis, A., Stinson, D.R.: On Unconditionally Secure Distributed Oblivious Transfer. Journal of Cryptology 20(3), 323–373 (2007)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献