{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:01:45Z","timestamp":1725552105723},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540306849"},{"type":"electronic","value":"9783540322672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593447_7","type":"book-chapter","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T06:37:16Z","timestamp":1132036636000},"page":"121-135","source":"Crossref","is-referenced-by-count":0,"title":["Revealing Additional Information in Two-Party Computations"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Jakoby","sequence":"first","affiliation":[]},{"given":"Maciej","family":"Li\u015bkiewicz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"7_CR1","doi-asserted-by":"crossref","first-page":"1930","DOI":"10.1109\/18.265501","volume":"39","author":"R. Bar-Yehuda","year":"1993","unstructured":"Bar-Yehuda, R., Chor, B., Kushilevitz, E., Orlitsky, A.: Privacy, additional information, and communication. IEEE Transactions on Information Theory\u00a039(6), 1930\u20131943 (1993); An early version of this paper appear in Proc. of 5th IEEE Structure in Complexity Theory, pp. 55\u201365 (1990)","journal-title":"IEEE Transactions on Information Theory"},{"key":"7_CR2","unstructured":"Beaver, D.: Perfect Privacy for Two Party Protocols. Technical Report TR-11-89, Harvard University (1989)"},{"key":"7_CR3","first-page":"1","volume-title":"Proc. of the 20th Ann. ACM Symp. on Theory of Computing (STOC)","author":"M. Ben-Or","year":"1988","unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proc. of the 20th Ann. ACM Symp. on Theory of Computing (STOC), pp. 1\u201310. ACM Press, New York (1988)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Bl\u00e4ser, M., Jakoby, A., Li\u015bkiewicz, M., Manthey, B.: Privacy in Non-Private Environments. In: Proceedings of the 10th Annual International Cryptology Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), pp. 137\u2013151 (2004)","DOI":"10.1007\/978-3-540-30539-2_11"},{"key":"7_CR5","first-page":"11","volume-title":"Proc. of the 20th Ann. ACM Symp. on Theory of Computing (STOC)","author":"D. Chaum","year":"1988","unstructured":"Chaum, D., Cr\u00e9peau, C., Damg\u00e5rd, I.: Multiparty unconditionally secure protocols. In: Proc. of the 20th Ann. ACM Symp. on Theory of Computing (STOC), pp. 11\u201319. ACM Press, New York (1988)"},{"issue":"2","key":"7_CR6","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1137\/0405021","volume":"5","author":"E. Kushilevitz","year":"1992","unstructured":"Kushilevitz, E.: Privacy and communication complexity. SIAM Journal on Discrete Mathematics\u00a05(2), 273\u2013284 (1992)","journal-title":"SIAM Journal on Discrete Mathematics"},{"key":"7_CR7","volume-title":"Communication Complexity","author":"E. Kushilevitz","year":"1997","unstructured":"Kushilevitz, E., Nisan, N.: Communication Complexity. Cambridge University Press, Cambridge (1997)"},{"key":"7_CR8","first-page":"160","volume-title":"Proc. of the 23rd Ann. IEEE Symp. on Foundations of Computer Science (FOCS)","author":"A.C.-C. Yao","year":"1982","unstructured":"Yao, A.C.-C.: Protocols for secure computations. In: Proc. of the 23rd Ann. IEEE Symp. on Foundations of Computer Science (FOCS), pp. 160\u2013164. IEEE Computer Society, Los Alamitos (1982)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593447_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:51:51Z","timestamp":1619506311000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593447_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540306849","9783540322672"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/11593447_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}