[1] Rabin M O. How to Exchange Secrets by Oblivious Transfer[R]. Technical Report: TR-81, Aiken Computation Laboratory, Harvard University, 1981.[2] Camenisch J, Dubovitskaya M, Neven G. Oblivious Transfer with Hidden Access Control Policies[C]//Proc. of the 14th International Conference on Practice and Theory in Public Key Cryptography. Berlin, Germany: Springer-Verlag, 2011: 192-209.[3] Choi Seung-Geol, Hwang Kyung-Wook, Katz J, et al. Secure Multi-party Computation of Boolean Circuits with Applications to Privacy in On-line Marketplaces[C]//Proc. of the 12th Conference on Topics in Cryptology. Berlin, Germany: Springer-Verlag, 2012: 416-432. (下转第173页)(上接第169页) [4] Even S, Goldreich O, Lempel A. A Randomized Protocol for Signing Contracts[J]. Communications of the ACM, 1985, 28(6): 637-647.[5] Wolf S. Reducing String Oblivious Transfer to Universal Obli- vious Transfer[C]//Proc. of IEEE International Symposium on Information Theory. [S. l.]: IEEE Press, 2000.[6] Tzeng Wen-Guey. Effcient 1-out-of-n Oblivious Transfer Schemes with Universally Usable Parameters[J]. IEEE Trans. on Computers, 2004, 53(2): 232-240.[7] 王凤和, 胡予濮, 刘振华. 格基不经意传输协议[J]. 通信学报, 2011, 32(3): 125-130.[8] Mu Yi, Zhang Junqi, Varadharajan V. m out of n Oblivious Transfer[C]//Proc. of the 7th Australian Conference on Information Security and Privacy. London, UK: Springer- Verlag, 2002: 395-405.[9] Chu Cheng-Kang, Tzeng Wen-Guey. Efficient k-out-of-n Obli- vious Transfer Schemes with Adaptive and Non-adaptive Queries[C]//Proc. of the 8th International Conference on Theory and Practice in Public Key Cryptography. Berlin, Germany: Springer-Verlag, 2005: 172-183.[10] Lindell Y, Zarosim H. Adaptive Zero-knowledge Proofs and Adaptively Secure Oblivious Transfer[C]//Proc. of the 6th Theory of Cryptography Conference. Berlin, Germany: Springer-Verlag, 2009: 183-201.[11] Chang C C, Lee J S. Robust t-out-of-n Oblivious Transfer Mechanism Based on CRT[J]. Journal of Network and Computer Applications, 2009, 32(1): 226-235.[12] 赵春明, 葛建华, 李新国. 隐藏认证的不经意传输[J]. 电子与信息学报, 2007, 29(8): 1984-1986.[13] Boneh D, Franklin M. Identity-based Encryption from the Weil Pairing[C]//Proc. of the 21st Annual International Cryptology Conference. London, UK: Springer-Verlag, 2001: 213-229.[14] Holt J E, Bradshaw R W, Seamons K E, et al. Hidden Cre- dentials[C]//Proc. of ACM Workshop on Privacy in Electronic Society. New York, USA: ACM Press, 2003: 1-8.[15] Qin Jing, Zhao Huawei. k out of n Oblivious Transfer Proto- cols from Bilinear Pairings[J]. Journal of Software, 2010, 5(1): 65-72.[16] Chou Jue-Sam, Wu Cheng-Lun, Chen Yalin. A Novel k-out-of- n Oblivious Transfer Protocol from Bilinear Pairing[EB/OL]. (2012-06-30). http://eprint.iacr.org/2011/ 150.pdf.编辑 顾逸斐 |