{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:25:53Z","timestamp":1725470753953},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540459071"},{"type":"electronic","value":"9783540459095"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11881223_3","type":"book-chapter","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T11:45:14Z","timestamp":1158925514000},"page":"20-30","source":"Crossref","is-referenced-by-count":0,"title":["Quantum ANDOS Protocol with Unconditional Security"],"prefix":"10.1007","author":[{"given":"Wei","family":"Yang","sequence":"first","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Mingjun","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Weiwei","family":"Jing","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","first-page":"234","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"G. Brassard","year":"1987","unstructured":"Brassard, G., Cr\u00e9peau, C., Robert, J.M.: All-or-Nothing Disclosure of Secrets. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 234\u2013238. Springer, Heidelberg (1987)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Wiesner, S.: Conjugate coding. In: Sigact News, vol.\u00a018, pp. 78\u201388 (1970) (Original manuscript written circa)","DOI":"10.1145\/1008908.1008920"},{"key":"3_CR3","unstructured":"Salomaa, A., Santean, L.: Secret selling of secrets with several buyers. In: 42nd EATCS Bulletin, pp. 178\u2013186 (1990)"},{"key":"3_CR4","unstructured":"Kent, A.: Unconditionally secure all-or-nothing disclosure of secrets. Arxiv preprint quant-ph\/9711025 (1997)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/3-540-49649-1_28","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"J.P. Stern","year":"1998","unstructured":"Stern, J.P.: A new and efficient all-or-nothing disclosure of secrets protocol. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 357\u2013371. Springer, Heidelberg (1998)"},{"key":"3_CR6","unstructured":"Lo, H.-K., Chau, H.F.: Is Quantum Bit Commitment Really Possible? Los Alamos preprint archive quant-ph\/9603004 (1996)"},{"key":"3_CR7","unstructured":"Mayers, D.: Unconditionally Secure Quantum Bit Commitment is Impossible. In: Fourth Workshop on Physics and Computation-PhysComp 1996 (1996)"},{"key":"3_CR8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundation of Cryptography Basic Tools","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O.: Foundation of Cryptography Basic Tools. Cambridge University Press, Cambridge (2001)"}],"container-title":["Lecture Notes in Computer Science","Advances in Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11881223_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:50:47Z","timestamp":1605624647000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11881223_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540459071","9783540459095"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/11881223_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}