Oblivious transfer and polynomial evaluation
- 1 May 1999
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 245-254
- https://doi.org/10.1145/301250.301312
Abstract
No abstract availableThis publication has 17 references indexed in Scilit:
- Secure ComputationPublished by Springer Nature ,2001
- Protecting data privacy in private information retrieval schemesPublished by Association for Computing Machinery (ACM) ,1998
- Decoding of Reed Solomon Codes beyond the Error-Correction BoundJournal of Complexity, 1997
- Efficient cryptographic schemes provably as secure as subset sumJournal of Cryptology, 1996
- Comparing information without leaking itCommunications of the ACM, 1996
- Oblivious transfers and intersecting codesIEEE Transactions on Information Theory, 1996
- How to construct random functionsJournal of the ACM, 1986
- A randomized protocol for signing contractsCommunications of the ACM, 1985
- Conjugate codingACM SIGACT News, 1983
- New directions in cryptographyIEEE Transactions on Information Theory, 1976