Rabin M. How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard Univ., 1981.[2]Li Ninghui, Du Wenliang, Boneh Dan. Oblivious signature-based envelope[A]. In Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003)[C], Boston, Massachusetts, ACM Press, New York, July 2003:182-189.[3]Rivest R L, Shamir A, Adleman L M. A method for obtaining digital signatures and public key cryptosystems[J].Communications of the ACM.1978, 21(2):120-126[4]Tobias Christian. Practical oblivious transfer protocols. [A]. 5th International Workshop on Information Hiding(IH 2002)[C]. Springer Verlag, LNCS 2578,Noordwijkerhout, The Netherlands, October 2002:415-426.[5]Ateniese G. Verifiable encryption of digital signatures and applications[J].ACM Transactions on Information and System Security.2004,7(1):1-20[6]ElGamal T. A Public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Trans. Information Theory.1985, 31(4):469-472[7]Tsiounis Y, Yung M. On the security of ElGamal-based encryption[A]. Proc. of PKC '98[C]. Springer Verlag, LNCS 1431, Yokohama, Japan, 1998: 117-134.[8]Aiello B.[J].Ishai Y, Reingold O. Priced oblivious transfer: How to sell digital goods[A]. Proc. Advances in Cryptology (Eurocrypt01)[C]. Springer Verlag, LNCS 2045, Innsbruck, Austria.2001,:-
|