Article PDF
References
Blum, M. “Three applications of the oblivious transfer”, manuscript, Univ. of Calif. Berkeley, 1981.
Blum, M. “How to exchange (secret) keys”, 15 ACM Symp. on Theory of Computing, 1983, 440–447.
Even, S., Goldreich, O., Lempel, A. “A randomized protocol for signing contracts”, Advances in Cryptology; Proceedings of Crypto 82, Plenum Press, 1983, 205–210.
Rabin, M. O. “How to exchange secrets by oblivious transfer”, manuscript, Harvard Center for Research in Computer Technology, 1981.
Author information
Authors and Affiliations
Additional information
Communicated by Claude Crépeau
Rights and permissions
About this article
Cite this article
Fischer, M.J., Micali, S. & Rackoff, C. A secure protocol for the oblivious transfer (extended abstract). J. Cryptology 9, 191–195 (1996). https://doi.org/10.1007/BF00208002
Issue Date:
DOI: https://doi.org/10.1007/BF00208002