Title :
More extensions of weak oblivious transfer
Keywords :
Computational complexity; Cryptographic protocols; Cryptography; Distributed computing; Entropy; Information security; Protection; Quantum computing; Random variables;
Conference_Titel :
Research, Innovation and Vision for the Future, 2006 International Conference on
Print_ISBN :
1-4244-0316-2
DOI :
10.1109/RIVF.2006.1696415