Author:
Kim Soongohn,Kim Seoksoo,Lee Geuk
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference15 articles.
1. M. Bellare, S. Micall, Non-interactive oblivious transfer and applications, in: Advances in Cryptology: CRYPTO’89, pp. 547–557
2. R. Berger, R. Peralta, T. Tedric, A provably secure oblivious transfer protocol, in: Advances in Cryptology: Proc. of EUROCRYPT’84, pp. 379–386
3. M. Blum, Three applications of oblivious transfer: 1. Coin flipping by telephone, 2. How to exchange secrets, 3. How to send certified electronic mail, Dept, EECS, University of California, Berkeley, CA, 1981
4. How to exchange (secret)keys;Blum;ACM Transaction on Computer System,1983
5. E. Brickle, D. Chaum, I. Damgard, J. van de Graaf, Gradual and verifiable release of a secret, in: Advances in Cryptology: CRYPTO’87, pp. 156–166
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献