{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:42:16Z","timestamp":1725471736197},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540472421"},{"type":"electronic","value":"9783540472438"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11902140_101","type":"book-chapter","created":{"date-parts":[[2006,10,26]],"date-time":"2006-10-26T13:35:29Z","timestamp":1161869729000},"page":"972-980","source":"Crossref","is-referenced-by-count":4,"title":["A Non-committing Encryption Scheme Based on Quadratic Residue"],"prefix":"10.1007","author":[{"given":"Feiyu","family":"Lei","sequence":"first","affiliation":[]},{"given":"Wen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kefei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"101_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/3-540-46766-1_31","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"D. Beaver","year":"1992","unstructured":"Beaver, D.: Foundations of secure interactive computing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 377\u2013391. Springer, Heidelberg (1992)"},{"key":"101_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/BFb0052228","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"D. Beaver","year":"1997","unstructured":"Beaver, D.: Plug and play encryption. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 75\u201389. Springer, Heidelberg (1997)"},{"key":"101_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/3-540-47555-9_26","volume-title":"Advances in Cryptology - EUROCRYPT \u201992","author":"D. Beaver","year":"1993","unstructured":"Beaver, D., Haber, S.: Cryptographic protocols provably secure against dynamic adversaries. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol.\u00a0658, pp. 307\u2013323. Springer, Heidelberg (1993)"},{"key":"101_CR4","unstructured":"Canetti, R.: Security and composition of multi-party cryptographic protocols. Obtainable from the Theory of Cryptography Library (August 1999)"},{"key":"101_CR5","unstructured":"Cramer, R., Damgard, I.: Multiparty computation, an introduction (2003), http:\/\/www.daimi.au.dk\/~ivan\/mpc.ps"},{"key":"101_CR6","unstructured":"Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multiparty computation. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, May 22-24, 1996, pp. 639\u2013648 (1996)"},{"key":"101_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/3-540-44598-6_27","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"I. Damgard","year":"2000","unstructured":"Damgard, I., Nielsen, J.B.: Improved non-committing encryption schemes based on a general complexity assumption. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 432\u2013450. Springer, Heidelberg (2000)"},{"key":"101_CR8","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Goldwasser, S.: Multi-party computations: past and present. In: ACM Symposium on Principles of Distributed Computing (1997)","DOI":"10.1145\/259380.259405"},{"key":"101_CR9","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp. 218\u2013229 (1987)","DOI":"10.1145\/28395.28420"},{"key":"101_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"S. Goldwasser","year":"1991","unstructured":"Goldwasser, S., Levin, L.: Fair Computation of General Functions in Presence of Immoral Majority. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, Springer, Heidelberg (1991)"},{"key":"101_CR11","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption and how to play mental poker keeping secret all partial information. In: Proceeding of 14th ACM Symposium, on the Theory of Computing, pp. 365\u2013377 (1982)","DOI":"10.1145\/800070.802212"},{"key":"101_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1007\/3-540-46766-1_32","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"S. Micali","year":"1992","unstructured":"Micali, S., Rogaway, P.: Secure computaion. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 392\u2013404. Springer, Heidelberg (1992)"},{"key":"101_CR13","volume-title":"Handbook of applied cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., Van Oorschot, P., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)"},{"key":"101_CR14","volume-title":"Modern Cryptography: Theory and Practice","author":"W. Mao","year":"2004","unstructured":"Mao, W.: Modern Cryptography: Theory and Practice. Prentice-Hall, Englewood Cliffs (2004)"},{"key":"101_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/0-387-34805-0_13","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"M. Naor","year":"1990","unstructured":"Naor, M.: Bit Commitment Using Pseudo-randomness. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 128\u2013136. Springer, Heidelberg (1990)"},{"key":"101_CR16","doi-asserted-by":"crossref","unstructured":"Nielsen, J.B.: Non-committing encryption is too easy in the Random Oracle Model. Basic Research in Computer Science Report, p. 20 (December 2001)","DOI":"10.7146\/brics.v8i47.21707"},{"key":"101_CR17","unstructured":"Yao, A.C.: Protocols for secure computations (extended abstract). In: 23rd Annual Symposium on Foundations of Computer Science [16], pp. 160\u2013164"}],"container-title":["Lecture Notes in Computer Science","Computer and Information Sciences \u2013 ISCIS 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11902140_101.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:56:18Z","timestamp":1605642978000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11902140_101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540472421","9783540472438"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11902140_101","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}