1. M. Atallah, M. Blanton, K. Frikken, J. Li, Efficient correlated action selection, in Financial Cryptography (2006), pp. 296–310
2. D. Beaver, Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. J. Cryptol.
4(2), 75–122 (1991)
3. D. Beaver, S. Micali, P. Rogaway, The round complexity of secure protocols. In Proceedings of the Twenty-Second Annual ACM Symposium on the Theory of Computing (1990), pp. 503–513
4. I. Blake, V. Kolesnikov, Strong conditional oblivious transfer and computing on intervals, in 10th International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT (2004), pp. 515–529
5. C. Cachin, Efficient private bidding and auctions with an oblivious third party, in Proc. 6th ACM Conference on Computer and Communications Security (1999), pp. 120–127