{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:35:28Z","timestamp":1725564928882},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340799"},{"type":"electronic","value":"9783540340805"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751649_76","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T14:07:52Z","timestamp":1147356472000},"page":"690-699","source":"Crossref","is-referenced-by-count":0,"title":["A New Secure Oblivious Transfer Protocol"],"prefix":"10.1007","author":[{"given":"Soon-gohn","family":"Kim","sequence":"first","affiliation":[]},{"given":"Heau-jo","family":"Kang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"76_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1007\/0-387-34805-0_48","volume-title":"Advances in Cryptology - CRYPTO 1989","author":"M. Bellare","year":"1990","unstructured":"Bellare, M., Micali, S.: Non-interactive oblivious transfer and applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 547\u2013557. Springer, Heidelberg (1990)"},{"key":"76_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/3-540-39757-4_26","volume-title":"Advances in Cryptology","author":"R. Berger","year":"1985","unstructured":"Berger, R., Peralta, R., Tedrick, T.: A provably secure oblivious transfer protocol. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 379\u2013386. Springer, Heidelberg (1985)"},{"key":"76_CR3","unstructured":"Blum, M.: Three applications of oblivious transfer: 1. Coin flipping by telephone, 2. How to exchange secrets, 3. How to send certified electronic mail, Dept., EECS, University of California, Berkeley, Calif (1981)"},{"issue":"2","key":"76_CR4","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/357360.357368","volume":"1","author":"M. Blum","year":"1983","unstructured":"Blum, M.: How to exchange (secret) keys. ACM Transaction on Computer System\u00a01(2), 175\u2013193 (1983)","journal-title":"ACM Transaction on Computer System"},{"key":"76_CR5","series-title":"Lecture Notes in Computer Science","first-page":"156","volume-title":"Advances in Cryptology - CRYPTO 1987","author":"E.F. Brickell","year":"1987","unstructured":"Brickell, E.F., Chaum, D., Damg\u00e5rd, I.B., van de Graaf, J.: Gradual and verifiable release of a secret. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 156\u2013166. Springer, Heidelberg (1987)"},{"key":"76_CR6","series-title":"Lecture Notes in Computer Science","first-page":"573","volume-title":"Advances in Cryptology - CRYPTO 1989","author":"R. Cleve","year":"1989","unstructured":"Cleve, R.: Controlled gradual disclosure schemes for random bits and their applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 573\u2013588. Springer, Heidelberg (1989)"},{"issue":"10","key":"76_CR7","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1049\/el:19900416","volume":"26","author":"L. Harn","year":"1990","unstructured":"Harn, L., Lin, H.Y.: Non-interactive oblivious transfer. Electronics Letters\u00a026(10), 635\u2013636 (1990)","journal-title":"Electronics Letters"},{"key":"76_CR8","series-title":"Lecture Notes in Computer Science","first-page":"187","volume-title":"Advances in Cryptology - ASIACRYPT 1991","author":"L. Harn","year":"1993","unstructured":"Harn, L., Lin, H.Y.: An oblivious Transfer Potocol and its Application for the Exchange of Secrets. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol.\u00a0739, pp. 187\u2013190. Springer, Heidelberg (1993)"},{"key":"76_CR9","doi-asserted-by":"crossref","unstructured":"Hastad, J., Shamir, A.: The cryptographic security of truncated linearly related variables. In: Proc. of 17th STOC, pp. 355\u2013362 (1985)","DOI":"10.1145\/22145.22184"},{"key":"76_CR10","volume-title":"The Art of Computer Programming","author":"D. Knuth","year":"1973","unstructured":"Knuth, D.: The Art of Computer Programming, vol.\u00a02. Addison Wesley, Reading (1973)"},{"key":"76_CR11","doi-asserted-by":"crossref","unstructured":"Luby, M., Micali, S., Rackoff, C.: How to simultaneously exchange a secret bit by flipping a symmetrically biased coin. In: Proc, 22nd Ann. IEEE Symp. On Foundations of Computer Science, pp. 11\u201321 (1983)","DOI":"10.1109\/SFCS.1983.25"},{"key":"76_CR12","unstructured":"Rabin, M.: How to exchange secret by oblivious transfer. In: Harvard Center for Research in Computer Technology, Cambridge, Mass. (1981)"},{"key":"76_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/3-540-49677-7_23","volume-title":"Advances in Cryptology 1981 - 1997","author":"T. Tedric","year":"1999","unstructured":"Tedric, T.: How to exchange half a bit. In: McCurley, K.S., Ziegler, C.D. (eds.) Advances in Cryptology 1981 - 1997. LNCS, vol.\u00a01440, pp. 147\u2013151. Springer, Heidelberg (1999)"},{"key":"76_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1007\/3-540-39568-7_34","volume-title":"Advances in Cryptology","author":"T. Tedrick","year":"1985","unstructured":"Tedrick, T.: Fair exchange of secrets. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 434\u2013438. Springer, Heidelberg (1985)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751649_76.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:02:02Z","timestamp":1619506922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751649_76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340799","9783540340805"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11751649_76","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}