Journal of Cryptology

, Volume 9, Issue 3, pp 191–195 | Cite as

A secure protocol for the oblivious transfer (extended abstract)

  • M. J. Fischer
  • S. Micali
  • C. Rackoff


Stochastic Process Computational Mathematic Probability Theory Secure Protocol Oblivious Transfer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Blum, M. “Three applications of the oblivious transfer”, manuscript, Univ. of Calif. Berkeley, 1981.Google Scholar
  2. [2]
    Blum, M. “How to exchange (secret) keys”, 15 ACM Symp. on Theory of Computing, 1983, 440–447.Google Scholar
  3. [3]
    Even, S., Goldreich, O., Lempel, A. “A randomized protocol for signing contracts”, Advances in Cryptology; Proceedings of Crypto 82, Plenum Press, 1983, 205–210.Google Scholar
  4. [4]
    Rabin, M. O. “How to exchange secrets by oblivious transfer”, manuscript, Harvard Center for Research in Computer Technology, 1981.Google Scholar

Copyright information

© International Association for Cryptologic Research 1996

Authors and Affiliations

  • M. J. Fischer
    • 1
  • S. Micali
    • 2
  • C. Rackoff
    • 3
  1. 1.Yale UniversityUSA
  2. 2.Massachusetts Institute of TechnologyUSA
  3. 3.University of TorontoCanada

Personalised recommendations