{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T21:22:53Z","timestamp":1751923373217},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201762"},{"type":"electronic","value":"9783540399810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/10958513_12","type":"book-chapter","created":{"date-parts":[[2006,7,6]],"date-time":"2006-07-06T07:00:21Z","timestamp":1152169221000},"page":"151-164","source":"Crossref","is-referenced-by-count":5,"title":["Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations"],"prefix":"10.1007","author":[{"given":"Anderson C. A.","family":"Nascimento","sequence":"first","affiliation":[]},{"given":"Joern","family":"Mueller-Quade","sequence":"additional","affiliation":[]},{"given":"Akira","family":"Otsuka","sequence":"additional","affiliation":[]},{"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"12_CR1","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/49.839935","volume":"18","author":"N. Asokan","year":"2000","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Optimistic Fair Exchange of Digital Signatures. IEEE Journal on Selected Areas in Communications\u00a018(4), 593\u2013610 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","first-page":"377","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"D. Beaver","year":"1991","unstructured":"Beaver, D.: Foundations of Secure Interactive Computing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 377\u2013391. Springer, Heidelberg (1991)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","first-page":"420","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"D. Beaver","year":"1991","unstructured":"Beaver, D.: Efficient Multiparty Protocols Using Circuit Randomization. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 420\u2013432. Springer, Heidelberg (1991)"},{"doi-asserted-by":"crossref","unstructured":"Beaver, D.: Commodity-Based Cryptography (Extended Abstract). In: STOC 1997, pp. 446\u2013455 (1997)","key":"12_CR4","DOI":"10.1145\/258533.258637"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/3-540-68535-9_40","volume-title":"Computing and Combinatorics","author":"D. Beaver","year":"1998","unstructured":"Beaver, D.: One-Time Tables for Two-Party Computation. In: Hsu, W.-L., Kao, M.-Y. (eds.) COCOON 1998. LNCS, vol.\u00a01449, pp. 361\u2013370. Springer, Heidelberg (1998)"},{"issue":"1-3","key":"12_CR6","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1023\/A:1016501125022","volume":"26","author":"C. Blundo","year":"2002","unstructured":"Blundo, C., Masucci, B., Stinson, D.R., Wei, R.: Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes. Designs, Codes, and Cryptography, Special Issue in Honour of Ron Mullin\u00a026(1-3), 97\u2013110 (2002)","journal-title":"Designs, Codes, and Cryptography, Special Issue in Honour of Ron Mullin"},{"doi-asserted-by":"crossref","unstructured":"Chaum, D., Crepeau, C., Damgard, I.: Multiparty Unconditionally Secure Protocols (extended abstract). In: STOC 1988, pp. 11\u201319 (1988)","key":"12_CR7","DOI":"10.1145\/62212.62214"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","first-page":"573","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Cleve","year":"1989","unstructured":"Cleve, R.: Controlled Gradual Disclosure Schemes for Random Bits and Their Applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 573\u2013588. Springer, Heidelberg (1989)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/3-540-44750-4_9","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"C. Crepeau","year":"1995","unstructured":"Crepeau, C., van de Graaf, J., Tapp, A.: Committed Oblivious Transfer and Private Multi-Party Computations. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 110\u2013123. Springer, Heidelberg (1995)"},{"unstructured":"Goldreich, O.: Secure Multi-Party Computation, lecture notes, Available from http:\/\/www.wisdom.weizmann.ac.il\/~oded\/pp.html","key":"12_CR10"},{"doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness Theorems for Non- Cryptographic Fault-Tolerant Distributed Computation. In: 20th STOC, pp. 1\u201310 (1988)","key":"12_CR11","DOI":"10.1145\/62212.62213"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/0-387-34799-2","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"S. Goldwasser","year":"1990","unstructured":"Goldwasser, S., Levin, L.A.: Fair Computation of General Functions in Presence of Immoral Majority. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 77\u201393. Springer, Heidelberg (1990)"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/3-540-44448-3_11","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"G. Hanaoka","year":"2000","unstructured":"Hanaoka, G., Shikata, J., Zheng, Y., Imai, H.: Unconditionally Secure Digital Signature Schemes Admitting Transferability. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 130\u2013142. Springer, Heidelberg (2000)"},{"doi-asserted-by":"crossref","unstructured":"Kilian, J.: Founding Cryptography on Oblivious Transfer. In: STOC 1988, pp. 20\u201331 (1988)","key":"12_CR14","DOI":"10.1145\/62212.62215"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-48184-2_14","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"T. Matsumoto","year":"1988","unstructured":"Matsumoto, T., Imai, H.: On the Key Predistribution Systems: A Practical Solution to the Key Distribution Problem. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 185\u2013193. Springer, Heidelberg (1988)"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","first-page":"392","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"S. Micali","year":"1991","unstructured":"Micali, S., Rogaway, P.: Secure Computation (Abstract). In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 392\u2013404. Springer, Heidelberg (1991)"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/3-540-44828-4_11","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"A.C.A. Nascimento","year":"2003","unstructured":"Nascimento, A.C.A., Mueller-Quade, J., Otsuka, A., Imai, H.: Unconditionally Secure Homomorphic Commitments. In: Fossorier, M.P.C., H\u00f8holdt, T., Poli, A. (eds.) AAECC 2003. LNCS, vol.\u00a02643, pp. 87\u201397. Springer, Heidelberg (2003)"},{"issue":"6","key":"12_CR18","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1145\/195613.195621","volume":"41","author":"T. Rabin","year":"1994","unstructured":"Rabin, T.: Robust Sharing of Secrets When the Dealer Is Honest or Cheating. JACM\u00a041(6), 1089\u20131109 (1994)","journal-title":"JACM"},{"unstructured":"Rivest, R.L.: Unconditionally Secure Commitment and Oblivious Transfer Schemes Using Concealing Channels and a Trusted Initializer, Available from http:\/\/theory.lcs.mit.edu\/~rivest\/Rivest-commitment.pdf (preprint)","key":"12_CR19"},{"doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for Secure Computations. In: FOCS 1982, pp. 160\u2013164 (1982)","key":"12_CR20","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10958513_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T17:14:16Z","timestamp":1555694056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10958513_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201762","9783540399810"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/10958513_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}