|
[1] W. Mao, Modern Cryptography: Theory and Practice, Prentice Hall, New Jersey, 2003.
[2] B. Aiello, Y. Ishai, and O. Reingold, “Priced Oblivious Transfer: How to Sell Digital Goods,” Proceedings of Advances in Cryptology - Eurocrypt 2001, LNCS 2045, pp.119-135, 2001.
[3] D. Beaver, S. Goldwasser, “Multiparty computation with faulty majority,” Proceedings of the 30th IEEE Symposium on Foundations of Computer Science (FOCS), pp.468-473, 1989.
[4] M. Bellare and S. Micali, “Non-Interactive Oblivious Transfer and Applications,” Proceedings of Advances in Cryptology - Crypto ’89, LNCS 435, pp.547-557, 1990.
[5] F. Boudot, “Efficient proofs that a committed number lies in an interval,” Proceedings of Advances in Cryptology - Eurocrypt 2000, LNCS 1807, pp.431-444, 2000.
[6] G. Brassard, C. Crépeau, and J.M. Robert, “All-or-nothing disclosure of secrets,” Proceedings of Advances in Cryptology - Crypto ’86, LNCS 263, pp.234-238, 1986.
[7] D. Chaum, “Blind Signatures for Untraceable Payments,” Proceedings of Advances in Cryptology - Crypto ’82, pp.199-203, 1982.
[8] C. Crepeau, J. van de Graaf, and A. Tapp, “Committed oblivious transfer and private multi-party computations,” Proceedings of Advances in Cryptology – Crypto’95, LNCS 963, pp.110-123, 1995.
[9] G. D. Crescenzo, T. Malkin, and R. Ostrovsky, “Single Database Private Information Retrieval Implies Oblivious Transfer,” Proceedings of Advances in Cryptology - Eurocrypt 2000, LNCS 1807, pp.122-138, 2000.
[10] S. Even, O. Goldreich, and A. Lemple, “A randomized protocol for signing contracts,” Communications of the ACM, vol. 28, pp.637-647, 1985.
[11] E. Fujisaki and T. Okamoto, “Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations,” Proceedings of Advances in Cryptology - Crypto ’97, LNCS 1294, pp.16-30, 1997. [12] J. A. Garay and P. Mackenzie, “Concurrent Oblivious Transfer,” Proceedings of the 41st IEEE Symposium on Foundations of Computer Science, pp.314-324, 2000.
[13] H. F. Huang and C.C. Chang, “A New Design for Efficient t-out-n Oblivious Transfer Scheme,” The First International Workshop on Information Networking and Applications (INA 2005), Vol. 2, Taiwan, Mar. 2005, pp.499-502.
[14] J. Kilian, “Founding Cryptography on Oblivious Transfer,” Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC), pp.20-31, 1988.
[15] K. Kurosawa and Q.V. Duong, “How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E87-A, no. 1, pp.141-146, 2004.
[16] E. Kushilevitz, S. Micali, and R. Ostrovsky, “Reducibility and completeness in multi-party private computations,” Proceedings of the 35th IEEE Symposium on Foundations of Computer Science (FOCS), pp.478-489, 1994.
[17] C. H. Lim and P.J. Lee, “Modified Maurer-Yacobi’s scheme and its applications,” Proceedings of Advances in Cryptology - Asiacrypt ’92, LNCS 718, pp.308-323, 1992.
[18] D. Malkhi and Y. Sella, “Oblivious Transfer Based on Blind Signatures,” Technical report, Leibniz Center For Research in Computer Science: Report 2003/31, 2003.
[19] S. Matsuo and W. Ogata, “Matching Oblivious Transfer: How to Exchange Valuable Data,” IEICE Transactions on Fundamentals of Electronics, Communication and Computer Sciences, vol. E86-A, no. 1, pp.189-193, 2003.
[20] U. M. Maurer and Y. Yacobi, “Non-interactive Public-Key Cryptography,” Proceedings of Advances in Cryptology - Eurocrypt ’91, LNCS 547, pp.498-507, 1991.
[21] J. H. Moore, “Protocol failures in cryptosystems,” Proceedings of the IEEE, vol. 76, issue: 5, pp.594-602, 1988.
[22] Y. Mu, J. Zhang, and V. Varadharajan, “m out of n Oblivious Transfer,” Australasian Conference on Information Security and Privacy (ACISP) 2002, LNCS 2384, pp.395-405, 2002.
[23] Y. Mu, J. Zhang, V. Varadharajan, and Y.X. Lin, “Robust Non-Interactive Oblivious Transfer,” IEEE Communications Letters, vol. 7, no. 4, pp.153-155, 2003. [24] M. Naor and B. Pinkas, “Distributed Oblivious Transfer,” Proceedings of Advances in Cryptology - Asiacrypt 2000, LNCS 1976, pp.205-219, 2000.
[25] M. Naor and B. Pinkas, “Efficient Oblivious Transfer Protocols,” Proceedings of the 12th Annual Symposium on Discrete Algorithms (SODA), pp.448-457, 2001.
[26] W. Ogata and K. Kurosawa, “Oblivious Keyword Search,” Technical report, Cryptology ePrint Archive: Report 2002/182, 2002.
[27] W. Ogata and R. Sasahara, “k out of n Oblivious Transfer without Random Oracles,” IEICE Transactions on Fundamentals of Electronics, Communication and Computer Sciences, vol. E87-A, no. 1, pp. 147-151, 2004.
[28] M. Rabin, “How to Exchange Secrets by Oblivious Transfer,” Technical Report TR-81, Aiken Computation Lab., Harvard University, 1981.
[29] C. Tobias, “Practical Oblivious Transfer Protocols,” Information Hiding (IH) 2002, LNCS 2578, pp.415-426, 2002.
[30] W. G. Tzeng, “Efficient 1-out-n oblivious transfer schemes,” Public Key Cryptography (PKC) 2002, LNCS 2774, pp.159-171, 2002.
[31] W. G. Tzeng, “Efficient 1-out-of-n Oblivious Transfer Schemes with Universally Usable Parameters,” IEEE Transactions on Computers, vol. 53, no. 2, pp.232-240, 2004.
[32] Q. H. Wu, J. H. Zhang, and Y. M. Wang, “Practical t-out-n Oblivious Transfer and Its Applications,” International Conference on Information and Communications Security (ICICS) 2003, LNCS 2836, pp.226-237, 2003.
[33] A. Yao, “How to generate and exchange secrets,” Proceedings of the 27th IEEE Symposium on Foundations of Computer Science (FOCS), pp.162-167, 1986.
[34] A. Chan, Y. Frankel, and Y. Tsiounis, “Easy Come – Easy Go Divisible Cash,” Updated version with corrections, GTE Tech. Rep. (1998), available at http://www.ccs.neu.edu/home/yiannis/
|