A. Peutéconomiserpeutéconomiser-un-bit-de-lamanì-ere-suivante, au lieu de situer son vecteur parmi les 8 orthants possibles, elle se limitè a 4 orthants, quittè a changer le signe de a ? . Sa sortie indique précisément si elle a changé le signe ou non, Soit z =, issue.1 1 2

. Dans-le-modèle, on suppose que les joueurs peuvent tricher afin d'obtenir de l'information. De même, les joueurs doivent avoir apprisàapprisà la fin du protocole, aussi peu d'information que possible. Aussi peu que possible signifie que le joueur qui donne la valeur de la fonction ne doit rien apprendre d'autre que ce qu

. Voici-maintenant-le-nouveau-protocole, Celui-ci est conçu pour que la distribution reste identique, et pour y parvenir, Alice doit réactualiser son aléa en fonction des messages envoyés. ? Alice et Bob choisissent leur aléa r A et r B . ? A la i-` emé etape

?. En, les joueurs tirent un message suivant la distribution : Prob[A i |A [i?1] , B [i?1] , r], c'est-` a-dire un message consistant avec l'aléa partagé r et l'historique des messages, en moyenne sur l'aléa privé r A d'Alice. L'idée est que d

B. , A. , B. , S. , T. O|x et al., Nous allons dans un premier temps vérifier que la distribution est la même que dans le protocole original Dans un second temps, nous vérifierons que le protocole est bien défini. On a dans le nouveau protocole la distribution suivante : Prob[r A , r

. Pourtant, Nous avons ensuité etudié l'´ evaluation sécurisée Dans le modèle " honnête mais curieux " , nous avons caractérisé exactement le nombre de ET sécurisés nécessaires et suffisants pour calculer une fonction demanì ere sécurisée Comme une bo??tebo??te non-locale, cette ressource calcule le produit des entrées. Toutefois, le résultat du calcul avec un ET est donné directementàdirectementà un joueur, ce qui semblê etre une différence importante. Dans le cas probabiliste, nous avons donné des bornes inférieures et supérieures sur le nombre de bo??tesbo??tes OT nécessaires et suffisantes pour réaliser l'´ evaluation sécurisée. Les bo??tesbo??tes non-locales ontétéontété utiles dans les deux cas

A. A. Bibliographie, J. Aspect, G. Dalibard, and . Roger, Experimental test of bell's inequalities using time-varying analyzers, Physical Review Letters, issue.25, pp.491804-1807, 1982.

P. [. Aspect, G. Grangier, and . Roger, Experimental Tests of Realistic Local Theories via Bell's Theorem, Physical Review Letters, vol.47, issue.7, pp.460-463, 1981.
DOI : 10.1103/PhysRevLett.47.460

P. [. Aspect, G. Grangier, and . Roger, : A New Violation of Bell's Inequalities, Physical Review Letters, vol.49, issue.2, pp.91-94, 1982.
DOI : 10.1103/PhysRevLett.49.91

N. [. Agrawal, N. Kayal, and . Saxena, PRIMES is in P, Annals of Mathematics, vol.160, issue.2, pp.781-793, 2004.
DOI : 10.4007/annals.2004.160.781

C. S. Arora, R. Lund, M. Motwani, M. Sudan, and . Szegedy, Proof verification and the hardness of approximation problems, Journal of the ACM, vol.45, issue.3, pp.501-555, 1998.
DOI : 10.1145/278298.278306

]. A. Amb02 and . Ambainis, Quantum lower bounds by quantum arguments, Journal of Computer and System Sciences, vol.64, issue.4, pp.750-767, 2002.

Y. [. Alon, M. Matias, and . Szegedy, The Space Complexity of Approximating the Frequency Moments, Journal of Computer and System Sciences, vol.58, issue.1, pp.137-147, 1999.
DOI : 10.1006/jcss.1997.1545

A. [. Alon and . Naor, Approximating the Cut-Norm via Grothendieck's Inequality, SIAM Journal on Computing, vol.35, issue.4, pp.787-803, 2006.
DOI : 10.1137/S0097539704441629

]. J. Bar07 and . Barrett, Information processing in generalized probabilistic theories, Physical Review A, vol.75, issue.3, p.32304, 2007.

G. [. Bennett and . Brassard, Quantum cryptography: Public key distribution and coin tossing, Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, p.175, 1984.
DOI : 10.1016/j.tcs.2014.05.025

URL : http://doi.org/10.1016/j.tcs.2014.05.025

. H. Bbc-+-93-]-c, G. Bennett, C. Brassard, R. Crépeau, A. Jozsa et al., Teleporting an unknown quantum state via dual classical and epr channels, Physical Review Letters, vol.70, pp.1895-1899, 1993.

]. R. Bbc-+-01, H. Beals, R. Buhrman, M. Cleve, R. Mosca et al., Quantum lower bounds by polynomials, Journal of the ACM, vol.48, issue.4, pp.778-797, 2001.

]. G. Bbl-+-06, H. Brassard, N. Buhrman, A. A. Linden, A. Methot et al., Limit on nonlocality in any world in which communication complexity is not trivial, Physical Review Letters, issue.25, p.96250401, 2006.

H. Barnum, J. Barrett, M. Leifer, A. Wilce-buhrman, R. [. Cleve et al., Generalized nobroadcasting theorem Substituting quantum entanglement for communication Cost of exactly simulating quantum entanglement with classical communication Implications of superstrong nonlocality for cryptography Quantum vs. classical communication and computation, Proc. of the 30th Annual ACM Symposium on Theory of ComputingBdW01] H. Buhrman and R. de Wolf. Communication complexity lower bounds by polynomials Proc. of the 16th Annual IEEE Conference on Computational ComplexityBea96] D. Beaver. Correlated pseudorandomness and the complexity of private computations Proc. of the 28th Annual ACM Symposium on Theory of Computing, pp.1201-12041874, 1996.

A. Blumer, A. Ehrenfeucht, D. Haussler, M. K. Warmuth, P. Babai et al., Linear algebra methods in combinatorics. Preliminary Version 2 New applications of the incompressibility method : Part ii Randomized simultaneous messages : solution of a problem of yao incommunication complexity Non-local correlations as an information theoretic resource Beimel and T. Malkin. A quantitative approach to reductions in secure computation, Proc. of the 12th Annual IEEE Conference on Computational Complexity Proceedings of the First Theory of Cryptography ConferenceBNS92] L. Babai, N. Nisan, and M. Szegedy. Multiparty protocols, pseudorandom generators for LOGSPACE, and time-space trade-offs. Journal of Computer and System Sciences, pp.929-96919559, 1964.

M. Ben-or, S. Goldwasser, and A. Wigderson, Completeness theorems for noncryptographic faulttolerant distributed computations, Proc. of the 20th Annual ACM Symposium on Theory of Computing, pp.1-10, 1988.

S. [. Barrett and . Pironio, Popescu-Rohrlich Correlations as a Unit of Nonlocality, Physical Review Letters, vol.95, issue.14, p.140401, 2005.
DOI : 10.1103/PhysRevLett.95.140401

T. [. Beame, N. Pitassi, A. Segerlind, and . Wigderson, A Strong Direct Product Theorem for Corruption and the Multiparty Communication Complexity of Disjointness, computational complexity, vol.15, issue.4, pp.391-432, 2006.
DOI : 10.1007/s00037-007-0220-2

P. [. Brunner and . Skrzypczyk, Non-locality distillation and postquantum theories with trivial communication complexity, 2009.

L. [. Boyd and . Vandenberghe, Convex Optimization, 2004.

S. [. Bennett and . Wiesner, Communication via one-and twoparticle operators on einstein-podolsky-rosen states, Physical Review Letters, issue.20, pp.692881-2884, 1992.

T. [. Bar-yossef, I. Jayram, and . Kerenidis, Exponential Separation of Quantum and Classical One-Way Communication Complexity, SIAM Journal on Computing, vol.38, issue.1, pp.366-384, 2008.
DOI : 10.1137/060651835

T. [. Bar-yossef, R. Jayram, D. Kumar, and . Sivakumar, Information theory methods in communication complexity, Proceedings 17th IEEE Annual Conference on Computational Complexity, pp.93-102, 2002.
DOI : 10.1109/CCC.2002.1004344

T. [. Bar-yossef, R. Jayram, D. Kumar, and . Sivakumar, An information statistics approach to data stream and communication complexity, Journal of Computer and System Sciences, vol.68, issue.4, pp.702-732, 2004.
DOI : 10.1016/j.jcss.2003.11.006

C. [. Chaum, I. Crepeau, and . Damgard, Multiparty unconditionally secure protocols, Proceedings of the twentieth annual ACM symposium on Theory of computing , STOC '88, pp.11-19, 1988.
DOI : 10.1145/62212.62214

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.649.1111

O. [. Chor and . Goldreich, Unbiased bits from sources of weak randomness and probabilistic communication complexity, SIAM Journal on Computing, vol.17, issue.2, 1988.

N. [. Cerf, S. Gisin, and . Massar, Classical Teleportation of a Quantum Bit, Physical Review Letters, vol.84, issue.11, pp.2521-2524, 2000.
DOI : 10.1103/PhysRevLett.84.2521

N. [. Cerf, S. Gisin, S. Massar, and . Popescu, Simulating Maximal Quantum Entanglement without Communication, Physical Review Letters, vol.94, issue.22, p.94220403, 2005.
DOI : 10.1103/PhysRevLett.94.220403

]. G. Cha69 and . Chaitin, On the length of programs for computing finite binary sequences : Statistical considerations, Journal of the ACM, vol.16, issue.1, pp.145-169, 1969.

]. G. Cha75 and . Chaitin, A theory of program size formally identical to information theory, Journal of the ACM, vol.22, issue.3, pp.329-340, 1975.

J. F. Clauser, M. A. Horne, A. Shimony, and R. A. Holt, Proposed Experiment to Test Local Hidden-Variable Theories, Physical Review Letters, vol.23, issue.15, pp.880-884, 1969.
DOI : 10.1103/PhysRevLett.23.880

P. [. Cleve, B. Høyer, J. Toner, and . Watrous, Consequences and limits of nonlocal strategies, Proceedings. 19th IEEE Annual Conference on Computational Complexity, 2004., pp.236-249, 2004.
DOI : 10.1109/CCC.2004.1313847

E. [. Chor and . Kushilevitz, A Zero-One Law for Boolean Privacy, SIAM Journal on Discrete Mathematics, vol.4, issue.1, pp.36-47, 1991.
DOI : 10.1137/0404004

]. M. De-graaf and R. De-wolf, On Quantum Versions of the Yao Principle, Proc. of the 19th Annual Symposium on Theoretical Aspects of Computer Science, pp.347-358, 2002.
DOI : 10.1007/3-540-45841-7_28

M. [. Diffie and . Hellma, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

M. [. Degorre, S. Kaplan, J. Laplante, and . Roland, The Communication Complexity of Non-signaling Distributions, Proc. of the 34th International Symposium on Mathematical Foundations of Computer Science, 2009.
DOI : 10.1007/BF00417500

S. [. Degorre, J. Laplante, and . Roland, Simulating quantum correlations as a distributed sampling problem, Physical Review A, vol.72, issue.6, p.72, 2005.
DOI : 10.1103/PhysRevA.72.062314

Y. [. Doherty, B. Liang, S. Toner, and . Wehner, The Quantum Moment Problem and Bounds on Entangled Multi-prover Games, 2008 23rd Annual IEEE Conference on Computational Complexity, pp.199-210, 2008.
DOI : 10.1109/CCC.2008.26

S. [. Dodis and . Micali, Lower Bounds for Oblivious Transfer Reductions, Proc. of EUROCRYPT '99, pp.42-55, 1999.
DOI : 10.1007/3-540-48910-X_4

B. [. Einstein, N. Podolsky, and . Rosen, Can quantum-mechanical description of physical reality be considered complete ? Physical Review, pp.777-780, 1935.

J. [. Freedman and . Clauser, Experimental Test of Local Hidden-Variable Theories, Physical Review Letters, vol.28, issue.14, pp.938-941, 1972.
DOI : 10.1103/PhysRevLett.28.938

]. R. Fey82 and . Feynman, Simulating physics with computers, International Journal of Theoretical Physics, vol.21, issue.6, pp.467-488, 1982.

C. [. Foulis and . Randall, Empirical logic and tensor products, Interpretations and Foundations of Quantum Theory, volume Interpretations and Foundations of Quantum Theory, pp.1-20, 1981.

S. [. Forster, S. Winkler, and . Wolf, Distilling Nonlocality, Physical Review Letters, vol.102, issue.12, 2009.
DOI : 10.1103/PhysRevLett.102.120401

URL : http://arxiv.org/abs/0809.3173

]. P. Gác74 and . Gács, On the symmetry of algorithmic information of algorithmic information, Soviet Mathematics Doklady, vol.15, pp.1477-1480, 1974.

]. D. Gav09 and . Gavinsky, Classical interaction cannot replace quantum nonlocality, 2009.

]. D. Gkdw06, J. Gavinsky, R. Kempe, and . De-wolf, Strengths and weaknesses of quantum fingerprinting, Proc. of the 21st Annual IEEE Conference on Computational Complexity, pp.288-295, 2006.

]. D. Gkk-+-07, J. Gavinsky, I. Kempe, R. Kerenidis, R. Raz et al., Exponential separations for one-way quantum communication complexity, with applications to cryptography, Proc. of the 39th Annual ACM Symposium on Theory of Computing, pp.516-525, 2007.

]. A. Gro56 and . Grothendieck, Résumé de la théorie métrique des produits tensoriels topologiques, pp.1-79, 1956.

]. H. Gro85 and . Groenewold, The elusive quantal individual, Physics Reports, vol.127, issue.6, pp.379-401, 1985.

]. L. Gro96 and . Grover, A fast quatum mechanical algorithm for database search, Proc. of the 28th Annual ACM Symposium on Theory of Computing, pp.212-219, 1996.

R. [. Goldreich and . Vainish, How to solve any protocol problem -an efficiency improvement, Advances in Cryptology -CRYPTO '87, pp.73-86, 1988.

D. [. Goemans and . Williamson, Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming, Journal of the ACM, vol.42, issue.6, pp.1115-1145, 1995.
DOI : 10.1145/227683.227684

]. J. Hås01 and . Håstad, Some optimal innappoximability results, Journal of the ACM, vol.48, issue.4, pp.798-859, 2001.

]. A. Hol73 and . Holevo, Some estimates for the amount of information transmittable by a quantum communications channel, Problemy Peredachi Informatsii, vol.9, issue.3, pp.3-11, 1973.

H. [. Iwama and . Morizumi, An Explicit Lower Bound of 5n ??? o(n) for Boolean Circuits, Proc. of the 27th International Symposium on Mathematical Foundations of Computer Science, pp.353-364, 2002.
DOI : 10.1007/3-540-45687-2_29

H. [. Jain, A. Klauck, and . Nayak, Direct product theorems for classical communication complexity via subdistribution bounds, Proceedings of the fourtieth annual ACM symposium on Theory of computing, STOC 08
DOI : 10.1145/1374376.1374462

R. [. Jayram, D. Kumar, and . Sivakumar, Two applications of information complexity, Proceedings of the thirty-fifth ACM symposium on Theory of computing , STOC '03, pp.673-682, 2003.
DOI : 10.1145/780542.780640

T. [. Janson, A. Luczak, and . Ruci, Random Graphs, 2000.
DOI : 10.1002/9781118032718

L. [. Jones and . Masanes, Interconversion of nonlocal correlations, Physical Review A, vol.72, issue.5, p.52312, 2005.
DOI : 10.1103/PhysRevA.72.052312

]. J. Jus72 and . Justesen, A class of constructive asymptotically good algebraic codes, IEEE Transactions on Information Theory, vol.18, pp.652-656, 1972.

S. Khot, On the power of unique 2-prover 1-round games, Proc. of the 35th Annual ACM Symposium on Theory of Computing, pp.767-775, 2002.

]. J. Kil88 and . Kilian, Basing cryptography on oblivious transfer, Proc. of the 20th Annual ACM Symposium on the Theory of Computing, pp.20-31, 1988.

]. A. Kit97 and . Kitaev, Quantum computations : algorithms and error correction, Russian Mathematical Survey, vol.52, pp.1191-1249, 1997.

I. [. Kaplan, S. Kerenidis, J. Laplante, and . Roland, Non-local box complexity and secure function evaluation, 2009.

]. J. Kkm-+-08, H. Kempe, K. Kobayashi, B. Matsumoto, T. Toner et al., Entangled games are hard to approximate, Proceedings of 49th Annual IEEE Symposium on Foundations of Computer Science, pp.447-456, 2008.

S. [. Kaplan and . Laplante, Kolmogorov complexity and combinatorial methods in communication complexity, Proc. of the 6th Conference on Theory and Applications of Models of Computation, pp.261-270, 2009.

]. H. Kla07 and . Klauck, Lower bounds for quantum communication complexity, SIAM Journal on Computing, vol.37, issue.1, pp.20-46, 2007.

N. [. Kushilevitz and . Nisan, Communication complexity, 1997.

N. [. Kremer, D. Nisan, and . Ron, On Randomized One-round Communication Complexity, Computational Complexity, vol.8, issue.1, pp.21-49, 1999.
DOI : 10.1007/s000370050018

]. A. Kol65 and . Kolmogorov, Three approaches to the quantitative definition of information, Problems of Information Transmission, vol.1, issue.1, pp.1-7, 1965.

]. I. Kre95 and . Kremer, Quantum communication, 1995.

[. Kläy, C. H. Randall, and D. J. Foulis, Tensor products and probability weights, International Journal of Theoretical Physics, vol.17, issue.3, pp.199-219, 1987.
DOI : 10.1007/BF00668911

]. J. Kri79 and . Krivine, Constantes de Grothendieck et fonctions de type positif sur les spheres, Advances in Math, vol.31, pp.16-30, 1979.

G. [. Kalyanasundaram and . Schnitger, The Probabilistic Communication Complexity of Set Intersection, SIAM Journal on Discrete Mathematics, vol.5, issue.4, pp.545-557, 1992.
DOI : 10.1137/0405044

]. E. Kus92 and . Kushilevitz, Privacy and communication complexity, SIAM Journal of Discrete Mathematics, vol.5, issue.2, pp.273-284, 1992.

A. [. Karchmer and . Wigderson, Monotone Circuits for Connectivity Require Super-Logarithmic Depth, SIAM Journal on Discrete Mathematics, vol.3, issue.2, pp.255-265, 1990.
DOI : 10.1137/0403021

]. T. Len90 and . Lengauer, VLSI theory. Handbook of theoretical computer science A) : algorithms and complexity, pp.835-866, 1990.

L. A. Levinlm08, ]. S. Laplante, F. Magniezls08b-]-n, A. Linial, . Shraibman-[-ls09-]-t et al., Lower bounds for randomized and quantum query complexity using kolmogorov arguments Lower bounds in communication complexity based on factorization norms. Random Structures and Algorithms An approximation algorithm for approximation rank A direct product theorem for discrepancy, Problems of Information TransmissionLS93] L. Lovàcz and M. Saks. Lattices, Möbius functions, and communication complexity Proc. of the 24th Annual IEEE Conference on Computational Complexity Proc. of the 23rd Annual IEEE Conference on Computational Complexity Unger. personal communicationLV08] M. Li and P. Vitanyi. An Introduction to Kolmogorov Complexity and Its ApplicationsMau92] T. Maudlin. Bell's inequality, information transmission, and prism models, pp.206-21046, 1974.

G. E. Moore, E. Mehlhorn, M. Schmidt, S. Navascues, A. Pironio et al., Cramming more components onto integrated circuits Las vegas is better than determinism in vlsi and distributed computing [New91] I. Newman. Public vs. private coin flips in one round communication games A convergent hierarchy of semidefinite programs characterizing the set of quantum correlations, Biennal Meeting of the Philosophy of Science Association Probabilistic Methods for Algorithmic Discrete Mathematics Proc. of the 14th Annual ACM Symposium on Theory of Computing 2008. 29 pages. [Pir03] S. Pironio. Violations of bell inequalities as lower bounds on the communication cost of nonlocal correlationsPR94] S. Popescu and D. Rohrlich. Causality and nonlocality as axioms for quantum mechanics. Foundations of PhysicsPSS84] W.J. Paul, J. Seiferas, and J. Simon. An information theoretic approach to time bounds for on-line computation. Journal of Computer and System Sciences, pp.404-417114, 1965.

A. Razborov, On the distributional complexity of disjointness, Theoretical Computer Science, vol.106, issue.2, pp.385-390, 1992.
DOI : 10.1016/0304-3975(92)90260-M

]. R. Raz95 and . Raz, Fourier analysis for probabilistic communication complexity, Computational Complexity, vol.106, issue.3-4, pp.205-221, 1995.
DOI : 10.1007/BF01206318

]. R. Raz99 and . Raz, Exponential separation of quantum and classical communication complexity, Proceedings of the thirty-first annual ACM symposium on Theory of computing , STOC '99, pp.358-367, 1999.
DOI : 10.1145/301250.301343

]. A. Raz03 and . Razborov, Quantum communication complexity of symmetric predicates, Izvestiya : Mathematics, vol.67, issue.1, pp.145-159, 2003.

D. [. Randall and . Foulis, Operational statistics and tensor products, Interpretations and Foundations of Quantum Theory, pp.21-28, 1981.

]. R. Roc70 and . Rockafellar, Convex Analysis, 1970.

B. [. Raz and . Spieker, On the ?log rank?-conjecture in communication complexity, Combinatorica, vol.108, issue.4, pp.567-588, 1995.
DOI : 10.1007/BF01192528

B. [. Regev and . Toner, Simulating quantum correlations with finite communication, Proc. of the 48th Annual IEEE Symposium on Foundations of Computer Science, pp.384-394, 2007.

]. N. Sau72 and . Sauer, On the density of families of sets, Journal of Combinatorial Theory (A), vol.12, pp.145-147, 1972.

]. C. Sha48 and . Shannon, A mathematical theory of communication, Bell System Technical Journal, vol.27, pp.379-423, 1948.

]. C. Sha49 and . Shannon, The synthesis of two-terminal switching circuits, Bell System Technical Journal, vol.28, pp.59-98, 1949.

]. A. She08 and . Sherstov, Communication complexity under product and nonproduct distributions, Proc. of the 23rd Annual IEEE Conference on Computational Complexity, pp.64-70, 2008.

]. P. Sho97 and . Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM Journal on Computing, vol.26, pp.1484-1509, 1997.

]. R. Sol64 and . Solomonoff, A formal theory of inductive inference, part 1 and part 2, Information and Control, vol.7, pp.1-22, 1964.

V. [. Solovay and . Strassen, A Fast Monte-Carlo Test for Primality, SIAM Journal on Computing, vol.6, issue.1, pp.84-85, 1977.
DOI : 10.1137/0206006

]. M. Ste00 and . Steiner, Towards quantifying non-local information transfer : finite-bit non-locality, Physical Letters A, vol.270, pp.239-244, 2000.

Y. [. Shi and . Zhu, Tensor Norms and the Classical Communication Complexity of Nonlocal Quantum Measurement, SIAM Journal on Computing, vol.38, issue.3, pp.753-766, 2008.
DOI : 10.1137/050644768

D. [. Toner and . Bacon, Communication Cost of Simulating Bell Correlations, Physical Review Letters, vol.91, issue.18, p.187904, 2003.
DOI : 10.1103/PhysRevLett.91.187904

B. S. Tsirelson, Quantum generalizations of Bell's inequality, Letters in Mathematical Physics, pp.93-100, 1980.

]. B. Tsi85 and . Tsirelson, Problems of the theory probability distributions ix English translation in Quantum analogues of the Bell inequalities. The case of two spatially separated domains, Zapiski Nauchnykh Seminarov Leningradskogo Otdeleniya Matematicheskogo Instituta, pp.174-194, 1985.

]. A. Tur36 and . Turing, On computable numbers, with an application to the entscheidungsproblem, Proceedings of the London Mathematical Society, pp.230-265, 1936.

E. [. Vértisi and . Bene, Lower bound on the communication cost of simulating bipartite quantum correlations [vD05] W. van Dam. Implausible consequences of superstrong nonlocality, 2005.

]. S. Wie83 and . Wiesner, Conjugate coding ACM SIGACT News -A special issue in cryptography, pp.78-88, 1983.

]. A. Wil92 and . Wilce, Tensor products in generalized measure theory, International Journal of Theoretical Physics, issue.11, pp.311915-1928, 1992.

J. [. Wolf and . Wullschleger, Oblivious transfer and quantum non-locality, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp.1745-1748, 2005.
DOI : 10.1109/ISIT.2005.1523644

J. [. Wolf and . Wullschleger, Oblivious Transfer Is Symmetric, Proc. of EUROCRYPT '06, pp.222-232, 2006.
DOI : 10.1007/11761679_14

]. A. Yao77 and . Yao, Probabilistic computations : Toward a unified measure complexity (extended abstract), Proc. of the 18th Annual Symposium on Foudations of Computer Science, pp.222-227, 1977.

]. A. Yao79 and . Yao, Some complexity questions related to distributive computing

]. A. Yao82 and . Yao, Protocols for secure computations (extended abstract) In proc, of the 23rd Annual Symposium of Foundations of Computer Science, pp.160-164, 1982.

]. A. Yao83 and . Yao, Lower bounds by probabilistic arguments (extended abstract)

]. A. Yao93 and . Yao, Quantum circuit complexity, Proc. of the 34th Annual IEEE Symposium on Foundations of Computer Science, pp.352-361, 1993.

]. A. Yao03 and . Yao, On the power of quantum fingerprinting, Proc. of the 35th Annual ACM Symposium on Theory of Computing, pp.77-81, 2003.