A secure protocol for the oblivious transfer (extended abstract)
KeywordsStochastic Process Computational Mathematic Probability Theory Secure Protocol Oblivious Transfer
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
- Blum, M. “Three applications of the oblivious transfer”, manuscript, Univ. of Calif. Berkeley, 1981.Google Scholar
- Blum, M. “How to exchange (secret) keys”, 15 ACM Symp. on Theory of Computing, 1983, 440–447.Google Scholar
- Even, S., Goldreich, O., Lempel, A. “A randomized protocol for signing contracts”, Advances in Cryptology; Proceedings of Crypto 82, Plenum Press, 1983, 205–210.Google Scholar
- Rabin, M. O. “How to exchange secrets by oblivious transfer”, manuscript, Harvard Center for Research in Computer Technology, 1981.Google Scholar
© International Association for Cryptologic Research 1996