Michael O Rabin. How to exchange secrets with
oblivious transfer. 1981.
 Shimon Even, Oded Goldreich, and Abraham
Lempel. A randomized protocol for signing con-
tracts. Communications of the ACM, 28(6):637–
 Gilles Brassard, Claude Cr´epeau, and Jean-
Marc Robert. All-or-nothing disclosure of se-
crets. In Conference on the Theory and Applica-
tion of Cryptographic Techniques, pages 234–238.
 Yi Mu, Junqi Zhang, and Vijay Varadharajan.
m out of n oblivious transfer. In Australasian
Conference on Information Security and Privacy,
pages 395–405. Springer, 2002.
 Chin-Chen Chang and Jung-San Lee. Robust t-
out-of-n oblivious transfer mechanism based on
crt. Journal of network and computer applications,
 Yalin Chen, Jue-Sam Chou, and Xian-Wu Hou.
A novel k-out-of-n oblivious transfer protocols
based on bilinear pairings. Cryptology ePrint
 Der-Chyuan Lou and Hui-Feng Huang. An effi-
cient t-out-of-n oblivious transfer for information
security and privacy protection. International
Journal of Communication Systems, 27(12):3759–
 Jianchang Lai, Yi Mu, Fuchun Guo, Rongmao
Chen, and Sha Ma. Efficient k-out-of-n oblivious
transfer scheme with the ideal communication
cost. Theoretical Computer Science, 714:15–26,
 Martin Stanek et al. Fast contract signing with
batch oblivious transfer. In IFIP International
Conference on Communications and Multimedia
Security, pages 1–10. Springer, 2005.
 Haruna Higo, Keisuke Tanaka, Akihiro Yamada,
and Kenji Yasunaga. A game-theoretic perspec-
tive on oblivious transfer. In Australasian Confer-
ence on Information Security and Privacy, pages
29–42. Springer, 2012.
 Han Jiang, Qiuliang Xu, Changyuan Liu, Zhihua
Zheng, Yi Tang, and Mingqiang Wang. Cut-
and-choose bilateral oblivious transfer protocol
based on ddh assumption. Journal of Ambient
Intelligence and Humanized Computing, pages
 Carmit Hazay, Peter Scholl, and Eduardo Soria-
Vazquez. Low cost constant round mpc combining
bmr and oblivious transfer. Journal of Cryptology,
 Sunil B Mane and Pradeep K Sinha. Oblivi-
ous information retrieval on outsourced database
servers. International Journal of Scientific and
Engineering Research, 5(5), 2014.
 Yu-Guang Yang, Si-Jia Sun, Qing-Xiang Pan,
and Peng Xu. Reductions between private in-
formation retrieval and oblivious transfer at the
quantum level. Optik, 126(21):3206–3209, 2015.
 Hoda Jannati and Behnam Bahrak. An oblivious
transfer protocol based on elgamal encryption for
preserving location privacy. Wireless Personal
Communications, 97(2):3113–3123, 2017.
 Tung Chou and Claudio Orlandi. The simplest
protocol for oblivious transfer. In International
Conference on Cryptology and Information Se-
curity in Latin America, pages 40–58. Springer,
 Eduard Hauck and Julian Loss. Efficient and
universally composable protocols for oblivious
transfer from the cdh assumption. Cryptology
ePrint Archive, 2017.
 Martin Hellman. New directions in cryptogra-
phy. IEEE transactions on Information Theory,
 I D´echene. Arithmetic of generalized jacobians,
algorithmic number theory symposium-ants vii.
Lecture Notes in Computer Science, pages 421–
 Abhishek Parakh. Oblivious transfer using ellip-
tic curves. In 2006 15th International Conference
on Computing, pages 323–328. IEEE, 2006.
 Paulo SLM Barreto, Bernardo David, Rafael
Dowsley, Kirill Morozov, and Anderson CA Nasci-
mento. A framework for efficient adaptively se-
cure composable oblivious transfer in the rom.
arXiv preprint arXiv:1710.08256, 2017.
 Zengpeng Li, Chunguang Ma, Minghao Zhao,
and Chang Choi. Efficient oblivious transfer con-
struction via multiple bits dual-mode cryptosys-
tem for secure selection in the cloud. Journal of
the Chinese Institute of Engineers, 42(1):97–106,
 Vipul Goyal, Abhishek Jain, Zhengzhong Jin,
and Giulio Malavolta. Statistical zaps and new
oblivious transfer protocols. In Annual Inter-
national Conference on the Theory and Applica-
tions of Cryptographic Techniques, pages 668–699.
 Nibedita Kundu, Sumit Kumar Debnath, and
Dheerendra Mishra. 1-out-of-2: post-quantum
oblivious transfer protocols based on multivariate
public key cryptography. S¯adhan¯a, 45(1):1–12,
 Saeid Esmaeilzade, Nasrollah Pakniat, and Ziba
Eslami. A generic construction to build simple
oblivious transfer protocols from homomorphic
encryption schemes. The Journal of Supercom-
puting, 78(1):72–92, 2022.
 Joseph H Silverman. The arithmetic of elliptic
curves, volume 106. Springer, 2009.
 Lawrence C Washington. Elliptic curves: num-
ber theory and cryptography. Chapman and Hal-
 Maxwell Rosenlicht. Generalized jacobian va-
rieties. Annals of Mathematics, pages 505–530,
 H Daghigh and M Bahramian. Generalized jaco-
bian and discrete logarithm problem on elliptic
 Don Johnson, Alfred Menezes, and Scott Vans-
tone. The elliptic curve digital signature algo-
rithm (ecdsa). International journal of informa-
tion security, 1(1):36–63, 2001.
 Cheng-Kang Chu and Wen-Guey Tzeng. Effi-
cient k-out-of-n oblivious transfer schemes with
adaptive and non-adaptive queries. In Interna-
tional Workshop on Public Key Cryptography,
pages 172–183. Springer, 2005.
 Jianhong Zhang and Yumin Wang. Two provably
secure k-out-of-n oblivious transfer schemes. Ap-
plied mathematics and computation, 169(2):1211–
 Neal Koblitz, Alfred Menezes, and Scott Van-
stone. The state of elliptic curve cryptography.
Designs, codes and cryptography, 19(2):173–193,