How to Break a “Secure” Oblivious Transfer Protocol
- 18 May 2001
- book chapter
- Published by Springer Nature
- p. 285-296
- https://doi.org/10.1007/3-540-47555-9_24
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Foundations of Secure Interactive ComputingPublished by Springer Nature ,2001
- Practical Quantum Oblivious TransferPublished by Springer Nature ,2001
- Oblivious transfer protecting secrecyPublished by Springer Nature ,1991
- The round complexity of secure protocolsPublished by Association for Computing Machinery (ACM) ,1990
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- Multiparty computation with faulty majorityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1989
- Minimum disclosure proofs of knowledgeJournal of Computer and System Sciences, 1988
- Non-transitive transfer of confidence: A perfect zero-knowledge interactive protocol for SAT and beyondPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- How to exchange (secret) keysACM Transactions on Computer Systems, 1983
- Protocols for secure computationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982