{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:56:23Z","timestamp":1775282183434,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540306849","type":"print"},{"value":"9783540322672","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593447_12","type":"book-chapter","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T06:37:16Z","timestamp":1132036636000},"page":"217-235","source":"Crossref","is-referenced-by-count":79,"title":["Quantum Anonymous Transmissions"],"prefix":"10.1007","author":[{"given":"Matthias","family":"Christandl","sequence":"first","affiliation":[]},{"given":"Stephanie","family":"Wehner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/0020-0190(83)90029-7","volume":"16","author":"B. Alpern","year":"1983","unstructured":"Alpern, B., Schneider, F.B.: Key exchange using keyless cryptography. Information Processing Letters\u00a016, 79\u201381 (1983)","journal-title":"Information Processing Letters"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Ambainis, A., Buhrman, H., R\u00f6hrig, H., Dodis, Y.: Multiparty quantum coin flipping. In: Proceedings of CCC 2003, pp. 250\u2013259 (2003)","DOI":"10.1109\/CCC.2004.1313848"},{"key":"12_CR3","unstructured":"Anonymizer. Anonymizing proxy, http:\/\/www.anonymizer.com"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"C. Bennett","year":"1993","unstructured":"Bennett, C., Brassard, G., Cr\u00e9peau, C., Jozsa, R., Peres, A., Wootters, W.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Physical Review Letters\u00a070, 1895\u20131899 (1993)","journal-title":"Physical Review Letters"},{"key":"12_CR5","unstructured":"Ben-Or, M., Mayers, D.: General security definition and composability for quantum & classical protocols. quant-ph\/0409062 (2004)"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web MIXes: A system for anonymous and unobservable Internet access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"key":"12_CR7","unstructured":"Boykin, P.: Information Security and Quantum Mechanics: Security of Quantum Protocols. PhD thesis, University of California, Los Angeles (2002)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: Electronic Colloquium on Computational Complexity (ECCC), p. 16 (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Canetti, R., Gennaro, R.: Incoercible Multiparty Computation (extended abstract). In: Proceedings of 37th IEEE FOCS, pp. 504\u2013513 (1996)","DOI":"10.1109\/SFCS.1996.548509"},{"issue":"2","key":"12_CR10","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology\u00a01, 65\u201375 (1988)","journal-title":"Journal of Cryptology"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Chaum, D., Cr\u00e9peau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: Proceedings of 20th ACM STOC, pp. 11\u201319 (1988)","DOI":"10.1145\/62212.62214"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau, C., Gottesman, D., Smith, A.: Secure multiparty quantum computation. In: Proceedings of 34th ACM STOC, pp. 643\u2013652 (2002)","DOI":"10.1145\/509907.510000"},{"key":"12_CR14","unstructured":"Dei, W.: Pipenet, http:\/\/www.eskimo.com\/~weidai\/pipenet.txt"},{"key":"12_CR15","unstructured":"Dingledine, R.: The free haven project: Design and deployment of an anonymous secure data haven. Master\u2019s thesis, Massachusetts Institute for Technology (2000)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium, pp. 303\u2013320 (2004)","DOI":"10.21236\/ADA465464"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1007\/3-540-46035-7_32","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"M. Fitzi","year":"2002","unstructured":"Fitzi, M., Gisin, N., Maurer, U., von Rotz, O.: Unconditional byzantine agreement and multi-party computation secure against dishonest minorities from scratch. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 482\u2013501. Springer, Heidelberg (2002)"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36467-6_1","volume-title":"Privacy Enhancing Technologies","author":"I. Goldberg","year":"2003","unstructured":"Goldberg, I.: Privacy-enhancing technologies for the internet, ii: Five years later. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 1\u201312. Springer, Heidelberg (2003)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Goldberg, I., Wagner, D., Brewer, E.: Privacy-enhancing technologies for the internet. In: Proceedings of 42nd IEEE Spring COMPCON (1997), http:\/\/now.cs.berkeley.edu\/~daw\/papers\/privacy-compcon97.ps","DOI":"10.21236\/ADA385546"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game\u2014or\u2014a completeness theorem for protocols with honest majority. In: Proceedings of 19th ACM STOC, pp. 218\u2013229 (1987)","DOI":"10.1145\/28395.28420"},{"key":"12_CR21","volume-title":"Bell\u2019s Theorem, Quantum Theory, and Conceptions of the Universe","author":"D.M. Greenberger","year":"1989","unstructured":"Greenberger, D.M., Horne, M.A., Zeilinger, A.: Bell\u2019s Theorem, Quantum Theory, and Conceptions of the Universe. Kluwer, Dordrecht (1989)"},{"key":"12_CR22","unstructured":"Helsingius, J.: Email anonymizing server: anon.penet.fi (1996)"},{"key":"12_CR23","unstructured":"Martin, D.: Local Anonymity in the Internet. PhD thesis, Boston University (1999)"},{"key":"12_CR24","unstructured":"MixMaster. Implementation of a remailer, http:\/\/mixmaster.sourceforge.net\/"},{"key":"12_CR25","unstructured":"M\u00fcller-Quade, J., Imai, H.: Anonymous oblivious transfer. cs.CR\/0011004 (2000)"},{"key":"12_CR26","volume-title":"Quantum Computation and Quantum Information","author":"M.A. Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"key":"12_CR27","unstructured":"Pfitzmann, A.: How to implement isdns without user observability - some remarks. Technical report, Universit\u00e4t Karlsruhe (1985)"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Pfitzmann, A.: Dienstintegrierende Kommunikationsnetze mit teilnehmerueberpruefbarem Datenschutz. PhD thesis, Fakultaet fuer Informatik, Universit\u00e4t Karlsruhe (1989)","DOI":"10.1007\/978-3-642-75544-6"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Waidner, M.: Composition and Integrity Preservation of Secure Reactive Systems. In: 7th ACM Conference on Computer and Communications Security, pp. 245\u2013254 (2000)","DOI":"10.1145\/352600.352639"},{"issue":"1","key":"12_CR30","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"key":"12_CR31","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal\u00a027, 379\u2013423, 623\u2013656 (1948)","journal-title":"Bell System Technical Journal"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.J.: The cocaine auction protocol: On the power of anonymous broadcast. In: Information Hiding, pp. 434\u2013447 (1999)","DOI":"10.1007\/10719724_30"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: IEEE Symposium on Security and Privacy, pp. 44\u201354 (1997)","DOI":"10.1109\/SECPRI.1997.601314"},{"key":"12_CR34","volume-title":"Computer Networks","author":"A.S. Tanenbaum","year":"1996","unstructured":"Tanenbaum, A.S.: Computer Networks, 3rd edn. Prentice-Hall, Englewood Cliffs (1996)","edition":"3"},{"key":"12_CR35","unstructured":"Tor: An anonymous Internet communication system, http:\/\/tor.eff.org"},{"key":"12_CR36","unstructured":"Unruh Simulatable, D.: security for quantum protocols. quant-ph\/0409125"},{"key":"12_CR37","unstructured":"Waidner, M., Pfitzmann, B.: Unconditional sender and recipient untraceability in spite of active attacks - some remarks. Technical report, Universit\u00e4t Karlsruhe (1989)"},{"key":"12_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"690","DOI":"10.1007\/3-540-46885-4_69","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"M. Waidner","year":"1990","unstructured":"Waidner, M., Pfitzmann, B.: The dining cryptographers in the disco: unconditional sender and recipient untraceability with computationally secure serviceability. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 690\u2013690. Springer, Heidelberg (1990)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593447_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T15:09:26Z","timestamp":1736089766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593447_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540306849","9783540322672"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/11593447_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}