共 50 条
- [41] SHADE: Secure HAmming DistancE Computation from Oblivious Transfer FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2013 WORKSHOPS, 2013, 7862 : 164 - 176
- [43] MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 830 - 842
- [44] Secure quantum weak oblivious transfer against individual measurements Quantum Information Processing, 2015, 14 : 2153 - 2170
- [45] SODA: A Set of Fast Oblivious Algorithms in Distributed Secure Data Analytics PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (07): : 1671 - 1684
- [46] Optimal secure data retrieval using an oblivious transfer scheme WIMOB'2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 2, PROCEEDINGS: MOBILE NETWORKING, 2005, : 25 - 31
- [48] Verifiable Distributed Oblivious Transfer and Mobile Agent Security Mobile Networks and Applications, 2006, 11 : 201 - 210
- [49] Scalar Product-Based Distributed Oblivious, Transfer INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 338 - 354