共 50 条
- [1] On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 56 - 73
- [2] Oblivious transfer based on the McEliece assumptions [J]. INFORMATION THEORETIC SECURITY, PROCEEDINGS, 2008, 5155 : 107 - +
- [3] Reducing Complexity Assumptions for Oblivious Transfer [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 110 - 124
- [5] Towards Wireless Security without Computational Assumptions -An Oblivious Transfer Protocol Based on an Unauthenticated Wireless Channel [J]. 2011 PROCEEDINGS IEEE INFOCOM, 2011, : 2156 - 2164
- [6] Practical Adaptive Oblivious Transfer from Simple Assumptions [J]. THEORY OF CRYPTOGRAPHY, 2011, 6597 : 347 - 363
- [8] Strengthening the Security of Distributed Oblivious Transfer [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 377 - 388