[1] Rabin M O. How to Exchange Secrets by Oblivious Transfer[R]. Technical Report: TR-81, Aiken Computation Laboratory, Harvard University, 1981. [2] Camenisch J, Dubovitskaya M, Neven G. Oblivious Transfer with Hidden Access Control Policies[C]//Proc. of the 14th International Conference on Practice and Theory in Public Key Cryptography. Berlin, Germany: Springer-Verlag, 2011: 192-209. [3] Choi Seung-Geol, Hwang Kyung-Wook, Katz J, et al. Secure Multi-party Computation of Boolean Circuits with Applications to Privacy in On-line Marketplaces[C]//Proc. of the 12th Conference on Topics in Cryptology. Berlin, Germany: Springer-Verlag, 2012: 416-432. (下转第173页) (上接第169页) [4] Even S, Goldreich O, Lempel A. A Randomized Protocol for Signing Contracts[J]. Communications of the ACM, 1985, 28(6): 637-647. [5] Wolf S. Reducing String Oblivious Transfer to Universal Obli- vious Transfer[C]//Proc. of IEEE International Symposium on Information Theory. [S. l.]: IEEE Press, 2000. [6] Tzeng Wen-Guey. Effcient 1-out-of-n Oblivious Transfer Schemes with Universally Usable Parameters[J]. IEEE Trans. on Computers, 2004, 53(2): 232-240. [7] 王凤和, 胡予濮, 刘振华. 格基不经意传输协议[J]. 通信学报, 2011, 32(3): 125-130. [8] Mu Yi, Zhang Junqi, Varadharajan V. m out of n Oblivious Transfer[C]//Proc. of the 7th Australian Conference on Information Security and Privacy. London, UK: Springer- Verlag, 2002: 395-405. [9] Chu Cheng-Kang, Tzeng Wen-Guey. Efficient k-out-of-n Obli- vious Transfer Schemes with Adaptive and Non-adaptive Queries[C]//Proc. of the 8th International Conference on Theory and Practice in Public Key Cryptography. Berlin, Germany: Springer-Verlag, 2005: 172-183. [10] Lindell Y, Zarosim H. Adaptive Zero-knowledge Proofs and Adaptively Secure Oblivious Transfer[C]//Proc. of the 6th Theory of Cryptography Conference. Berlin, Germany: Springer-Verlag, 2009: 183-201. [11] Chang C C, Lee J S. Robust t-out-of-n Oblivious Transfer Mechanism Based on CRT[J]. Journal of Network and Computer Applications, 2009, 32(1): 226-235. [12] 赵春明, 葛建华, 李新国. 隐藏认证的不经意传输[J]. 电子与信息学报, 2007, 29(8): 1984-1986. [13] Boneh D, Franklin M. Identity-based Encryption from the Weil Pairing[C]//Proc. of the 21st Annual International Cryptology Conference. London, UK: Springer-Verlag, 2001: 213-229. [14] Holt J E, Bradshaw R W, Seamons K E, et al. Hidden Cre- dentials[C]//Proc. of ACM Workshop on Privacy in Electronic Society. New York, USA: ACM Press, 2003: 1-8. [15] Qin Jing, Zhao Huawei. k out of n Oblivious Transfer Proto- cols from Bilinear Pairings[J]. Journal of Software, 2010, 5(1): 65-72. [16] Chou Jue-Sam, Wu Cheng-Lun, Chen Yalin. A Novel k-out-of- n Oblivious Transfer Protocol from Bilinear Pairing[EB/OL]. (2012-06-30). http://eprint.iacr.org/2011/ 150.pdf. 编辑 顾逸斐
|