Author:
Chou Yao-Hsin,Zeng Guo-Jyun,Kuo Shu-Yu
Publisher
Springer Science and Business Media LLC
Reference31 articles.
1. Rabin, M. O. How to exchange secrets by oblivious transfer. Tech. Rep., Aiken Computation Laboratory (1981).
2. Even, S., Goldreich, O. & Lempel, A. A randomized protocol for signing contracts. Communication of the ACM 28, 637–647 (1985).
3. Crépeau, C. Equivalence between two flavours of oblivious transfers. In Advances in Cryptology-CRYPTO'87, 350–354 (1988).
4. Rivest, R. L., Shamir, A. & Adleman, L. A. Method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978).
5. Shor, P. W. Algorithms for quantum computation: Discrete logarithms and factoring. In 35th Annual Symposium on Foundations of Computer Science, 124–134 (1994).
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献