scientific article; zbMATH DE number 1950357
From MaRDI portal
Publication:4412995
zbMATH Open1024.94515MaRDI QIDQ4412995FDOQ4412995
Authors: Yi Mu, Junqi Zhang, Vijay Varadharajan
Publication date: 17 July 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2384/23840395.htm
Title of this publication is not available (Why is that?)
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Computing methodologies for information systems (hypertext navigation, interfaces, decision support, etc.) (68U35)
Cited In (14)
- Quantum \(m\)-out-of-\(n\) oblivious transfer
- A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions
- Twot-out-of-n oblivious transfer schemes with designated receiver
- Oblivious keyword search with authorization
- Title not available (Why is that?)
- Efficient Traceable Oblivious Transfer and Its Applications
- Translucent cryptography -- an alternative to key escrow, and its implementation via fractional oblivious transfer
- Computational and Information Science
- An oblivious transfer scheme in Gaussian arithmetic
- Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost
- A new efficient protocol for \(k\)-out-of-\(n\) oblivious transfer
- A New Secure Oblivious Transfer Protocol
- Robust non-interactivet-out-of-noblivious transfer based on the RSA cryptosystem
- Comments on the `\(m\) out of \(n\) oblivious transfer'
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4412995)