共 50 条
- [1] SHADE: Secure HAmming DistancE Computation from Oblivious Transfer FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2013 WORKSHOPS, 2013, 7862 : 164 - 176
- [3] Quantum security analysis of a lattice-based oblivious transfer protocol Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1348 - 1369
- [5] Secure Hamming Distance Based Computation and Its Applications APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 107 - 124
- [6] Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance PLOS ONE, 2024, 19 (01):
- [7] Lottery Protocol Using Oblivious Transfer Based on ECC JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02): : 279 - 285
- [8] Universally composable oblivious transfer protocol based on VSPH Tongxin Xuebao/Journal on Communications, 2007, 28 (07): : 28 - 34
- [9] Towards Wireless Security without Computational Assumptions -An Oblivious Transfer Protocol Based on an Unauthenticated Wireless Channel 2011 PROCEEDINGS IEEE INFOCOM, 2011, : 2156 - 2164