scientific article; zbMATH DE number 1950357
From MaRDI portal
Publication:4412995
zbMath1024.94515MaRDI QIDQ4412995
Vijay Varadharajan, Yi Mu, Junqi Zhang
Publication date: 17 July 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2384/23840395.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computing methodologies for information systems (hypertext navigation, interfaces, decision support, etc.) (68U35)
Related Items (6)
Twot-out-of-n oblivious transfer schemes with designated receiver ⋮ Oblivious Keyword Search with Authorization ⋮ Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost ⋮ Efficient Traceable Oblivious Transfer and Its Applications ⋮ A New Efficient Protocol for k-out-of-n Oblivious Transfer ⋮ Comments on the `\(m\) out of \(n\) oblivious transfer'
This page was built for publication: