1. [1] M. Ajtai, J. Komlós, and E. Szemerédi, “An O(n log n) sorting network,” STOC, pp.1-9. ACM, 1983.
2. [2] A. Boldyreva, “Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme,” Y. Desmedt, ed., Public Key Cryptography, Lect. Notes Comput. Sci., vol.2567, pp.31-46, Springer, 2003.
3. [3] J. Camenisch, G. Neven, and A. Shelat, “Simulatable adaptive oblivious transfer,” M. Naor, ed., EUROCRYPT, Lect. Notes Comput. Sci., vol.4515, pp.573-590, Springer, 2007.
4. [4] C.-K. Chu and W.-G. Tzeng, “Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries,” S. Vaudenay, ed., Public Key Cryptography, Lect. Notes Comput. Sci., vol.3386, pp.172-183, Springer, 2005.
5. [5] T.H. Cormen, C.E. Leiserson, R.L. Rivest, and C. Stein, Introduction to algorithms, second edition, MIT Press, 2001.