{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T22:24:23Z","timestamp":1748384663763},"publisher-location":"New York, NY","reference-count":9,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387971964"},{"type":"electronic","value":"9780387347998"}],"license":[{"start":{"date-parts":[[1990,1,1]],"date-time":"1990-01-01T00:00:00Z","timestamp":631152000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1990]]},"DOI":"10.1007\/0-387-34799-2_1","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:17:36Z","timestamp":1186363056000},"page":"2-7","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Weakening Security Assumptions and Oblivious Transfer"],"prefix":"10.1007","author":[{"given":"Claude","family":"Cr\u00e9peau","sequence":"first","affiliation":[]},{"given":"Joe","family":"Kilian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,12,1]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Brassard, Gilles, Claude Cr\u00e9peau, and Jean-Marc Robert. \u201cInformation Theoritic Reductions Among Disclosure Problems,\u201d Proceedings of the 27thFOCS, IEEE, 1986, 168\u2013173.","DOI":"10.1109\/SFCS.1986.26"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Ben-Or, Michael, Shafi Goldwasser, and Avi Wigderson, \u201cCompleteness Theorems for Noncryptographic Fault-tolerant Distributed Computation,\u201d Proceedings of the 20thSTOC, ACM, 1988.","DOI":"10.1145\/62212.62213"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau Claude, \u201cEquivalence Between Two Flavours of Oblivious Transfer\u201d, Proceedings of Crypto 87, 1988, Springer-Verlag.","DOI":"10.1007\/3-540-48184-2_30"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Chaum David, Claude Cr\u00e9peau and Ivan Damg\u00e5rd, \u201cMultiparty unconditionally secure protocols,\u201d Proceedings of the 20thSTOC, ACM, 1988.","DOI":"10.1145\/62212.62214"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau Claude, and Joe Kilian, \u201cAchieving Oblivious Transfer Using Weakened Security Assumptions,\u201d to appear in Proceedings of the 29thFOCS, IEEE, 1988.","DOI":"10.1109\/SFCS.1988.21920"},{"issue":"6","key":"1_CR6","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S. Even","year":"1985","unstructured":"Even S., Goldreich O., and A. Lempel, \u201cA Randomized Protocol for Signing Contracts,\u201d CACM, vol. 28, no. 6, 1985, pp. 637\u2013647.","journal-title":"CACM"},{"key":"1_CR7","unstructured":"Feldman, Paul, Silvio Micali. \u201cByzantine Agreement from Scratch,\u201d Proceedings of the 20thSTOC, ACM, 1988."},{"key":"1_CR8","unstructured":"Rabin, M., \u201cHow to exchange secrets by oblivious transfer,\u201d Tech. Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981."},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A. D. Wyner","year":"1981","unstructured":"Wyner, A. D., \u201cThe Wire Tap Channel,\u201d Bell System Journal, 54, 1981, pp. 1355\u20131387.","journal-title":"Bell System Journal"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 88"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34799-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T17:58:50Z","timestamp":1684000730000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34799-2_1"}},"subtitle":["(Abstract)"],"short-title":[],"issued":{"date-parts":[[1990]]},"ISBN":["9780387971964","9780387347998"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/0-387-34799-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1990]]},"assertion":[{"value":"1 December 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}