共 27 条
[1]
[Anonymous], 2015, NDSS
[3]
Benaloh J., 1994, WORKSH SEL AR CRYPT
[4]
Benhamouda F, 2017, J CRYPTOL, V30, P519, DOI 10.1007/s00145-016-9229-5
[5]
Blake IF, 2006, LECT NOTES COMPUT SC, V4107, P206
[6]
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[7]
Ching-Hua Yu, 2012, Security and Cryptography for Networks. Proceedings of the 8th International Conference (SCN 2012), P426, DOI 10.1007/978-3-642-32928-9_24
[8]
The Simplest Protocol for Oblivious Transfer
[J].
PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015,
2015, 9230
:40-58
[9]
Coron JS, 2011, LECT NOTES COMPUT SC, V6571, P147, DOI 10.1007/978-3-642-19379-8_9
[10]
Damgard Ivan, 2009, International Journal of Applied Cryptography, V1, P323, DOI 10.1504/IJACT.2009.028031