| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
GORDON S D, KATZ J, KOLESNIKOV V, et al. Secure two-party computation in sublinear (amortized) time[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2012: 513-524.
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
MANSY D, RINDAL P. Endemic oblivious transfer[C]//Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2019: 309-326.
|
| 10 |
|
| 11 |
ASHAROV G, LINDELL Y, SCHNEIDER T, et al. More efficient oblivious transfer and extensions for faster secure computation[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2013: 535-548.
|
| 12 |
魏晓超, 蒋瀚, 赵川. 一个高效可完全模拟的n取1茫然传输协议. 计算机研究与发展, 2016, 53 (11): 2475- 2481.
|
|
WEI X C , JIANG H , ZHAO C . An efficient and fully simulatable n-1 oblivious transfer protocol. Journal of Computer Research and Development, 2016, 53 (11): 2475- 2481.
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
SONG J S , WANG D F , ZHANG Z Z , et al. Universally composable oblivious transfer with low communication. Applied Sciences, 2023, 13 (4): 2090.
doi: 10.3390/app13042090
|
| 17 |
|
| 18 |
GERTNER Y, MALKIN T, REINGOLD O. On the impossibility of basing trapdoor functions on trapdoor predicates[C]//Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science. Washington D.C., USA: IEEE Press, 2001: 126-135.
|
| 19 |
|
| 20 |
ZHU X P, WU Y, LI X D, et al. A new ciphertext based OT protocol in cloud computing[C]//Proceedings of the 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT). Washington D.C., USA: IEEE Press, 2023: 408-413.
|
| 21 |
高莹, 李寒雨, 王玮, 等. 不经意传输协议研究综述. 软件学报, 2023, 34 (4): 1879- 1906.
|
|
GAO Y , LI H Y , WANG W , et al. A review of research on oblivious transfer protocols. Journal of Software, 2023, 34 (4): 1879- 1906.
|
| 22 |
张爱娈, 李祯祯, 丁海洋, 等. 基于OT的多方匿名身份查询协议. 计算机应用研究, 2022, 39 (4): 1190- 1194.
|
|
ZHANG A L , LI Z Z , DING H Y , et al. Multi-party anonymous identity query protocol based on OT. Application Research of Computers, 2022, 39 (4): 1190- 1194.
|
| 23 |
YAO A C. Protocols for secure computations[C]//Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982). Washington D.C., USA: IEEE Press, 1982: 160-164.
|
| 24 |
YAO A C. How to generate and exchange secrets[C]//Proceedings of the 27th Annual Symposium on Foundations of Computer Science (sfcs 1986). Washington D.C., USA: IEEE Press, 1986: 162-167.
|
| 25 |
KOLESNIKOV V, KUMARESAN R, ROSULEK M, et al. Efficient batched oblivious PRF with applications to private set intersection[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2016: 818-829.
|
| 26 |
|
| 27 |
MU Y , ZHANG J Q , VARADHARAJAN V , et al. Robust non-interactive oblivious transfer. IEEE Communications Letters, 2003, 7 (4): 153- 155.
doi: 10.1109/LCOMM.2003.811213
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|