Login / Signup
Two provably secure k-out-of-n oblivious transfer schemes.
Jianhong Zhang
Yumin Wang
Published in:
Appl. Math. Comput. (2005)
Keyphrases
</>
provably secure
standard model
key management
security model
public key
blind signature
signature scheme
hash functions
bilinear pairings
blind signature scheme
public key cryptography
diffie hellman
encryption scheme
threshold signature scheme
wireless sensor networks
ad hoc networks
access control