[1]NAOR M, PINKAS B, SUMNER R. Privacy preserving auctions and mechanism design [C]// EC '99: Proceedings of the 1st ACM Conference on Electronic Commerce. New York: ACM, 1999:129-139.
[2]NAOR M, PINKAS B. Oblivious transfer and polynomial evaluation [C]// STOC '99: Proceedings of the 31st Annual ACM Symposium on Theory of Computing. New York: ACM, 1999:245-254.
[3]STADLER M, PIVETEAU J M, CAMENISCH J. Fair blind signature [C]// EUROCRYPT '95: Proceedings of the 14th Annual International Conference on Theory and Application of Cryptographic Techniques. Berlin: Springer-Verlag, 1995:209-219.
[4]GOLDREICH O, MICALI S, WIGDERSON A. How to play ANY mental game [C]// STOC '87: Proceedings of the 19th Annual ACM Symposium on Theory of Computing. New York: ACM, 1987:218-299.
[5]RABIN M O. How to exchange secrets by oblivious transfer[R/OL]. [2013-04-15]. http://eprint.iacr.org/2005/187.pdf.
[6]EVEN S, GOLDREICH O, LEMPEL A. A randomized protocol for signing contracts [J]. Communications of the ACM, 1985,28(6):637-647.
[7]CHEN Y, CHOU J S, HOU X W. A novel k-out-of-n oblivious transfer protocols based on bilinear pairings [EB/OL]. [2012-09-25]. http://eprint.iacr.org/2010/027.pdf.
[8]CHOU J S. A novel k-out-of-n oblivious transfer protocol from bilinear pairing [J]. Advances in Multimedia: Special Issue on Web Services in Multimedia Communication, 2012,2012:1-9.
[9]CHU C K, TZENG W G. Efficient k-out-of-n oblivious transfer schemes [J]. Journal of Universal Computer Science, 2008,14(3):397-415.
[10]MURUGESAN M, JIANG W, NERGIZ A E, et al. k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations [C]// CODASPY '11: Proceedings of the 1st ACM Conference on Data and Application Security and Privacy. New York: ACM, 2011:169-178.
[11]CHANG C C, LEE J S. Robust t-out-of-n oblivious transfer mechanism based on CRT [J]. Journal of Network and Computer Applications, 2009,32(1):226-235.
[12]JAIN A, HARI C. A new efficient protocol for k-out-of-n oblivious transfer [EB/OL]. [2013-05-09]. http://arxiv.org/pdf/0909.2852.pdf.
[13]MA X, XU L, ZHANG F. Oblivious transfer with timed release receiver's privacy [J]. Journal of Systems and Software, 2011,84(3):460-464.
[14]ZHANG J, WANG Y. Two provably secure k-out-of-n oblivious transfer schemes [J]. Applied Mathematics and Computation, 2005,169(2):1211-1220. |