On the foundations of oblivious transfer
- 1 January 1998
- book chapter
- Published by Springer Nature
- p. 361-374
- https://doi.org/10.1007/bfb0054139
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- Reducibility and completeness in multi-party private computationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Private simultaneous messages protocols with applicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Oblivious transfers and intersecting codesIEEE Transactions on Information Theory, 1996
- Generalized privacy amplificationIEEE Transactions on Information Theory, 1995
- A general completeness theorem for two party gamesPublished by Association for Computing Machinery (ACM) ,1991
- Worst-case interactive communication. I. Two messages are almost optimalIEEE Transactions on Information Theory, 1990
- Pseudo-random generation from one-way functionsPublished by Association for Computing Machinery (ACM) ,1989
- How to generate and exchange secretsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- A Randomized Protocol for Signing ContractsPublished by Springer Nature ,1983
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979