The following publications are possibly variants of this publication:
- Practical Frameworks For h-Out-Of-n Oblivious Transfer With Security Against Covert and Malicious AdversariesBing Zeng, Xueming Tang, Peng Xu, Jiandu Jing. iacr, 2011:1, 2011. [doi]
- k-out-of-n oblivious transfer protocol with security against malicious adversariesXiaochao Wei, Qiuliang Xu, Yi Tang. csse, 32(2), 2017.
- Practical Server-Aided k-out-of-n Oblivious Transfer ProtocolXiaochao Wei, Chuan Zhao, Han Jiang, Qiuliang Xu, Hao Wang. GPC 2016: 261-277 [doi]