{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T21:40:11Z","timestamp":1737495611523,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540006220"},{"type":"electronic","value":"9783540364924"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_19","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T23:36:10Z","timestamp":1193182570000},"page":"291-309","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["New Results on Unconditionally Secure Distributed Oblivious Transfer"],"prefix":"10.1007","author":[{"given":"Carlo","family":"Blundo","sequence":"first","affiliation":[]},{"given":"Paolo","family":"D\u2019Arco","sequence":"additional","affiliation":[]},{"given":"Alfredo","family":"De Santis","sequence":"additional","affiliation":[]},{"given":"Douglas R.","family":"Stinson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"issue":"1","key":"19_CR1","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s001459900017","volume":"10","author":"D. Beaver","year":"1997","unstructured":"D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway, Locally Random Reductions: Improvements and Applications, Journal of Cryptology 10 (1), pp. 17\u201336, 1997.","journal-title":"Journal of Cryptology"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/3-540-44598-6_4","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"Amos Beimel","year":"2000","unstructured":"A. Beimel, Y. Ishai, and T. Malkin, Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing, Advances in Cryptology: Proceedings of Crypto 2000, Springer-Verlag, vol. 1880, pp. 55\u201373, 2000."},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"M. Bellare and S. Micali, Non-interactive Oblivious Transfer and Applications, Advances in Cryptology: Crypto\u2019 89, Springer-Verlag, pp. 547\u2013559, 1990.","DOI":"10.1007\/0-387-34805-0_48"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"G.R. Blakley. Safeguarding Cryptographic Keys. Proceedings of AFIPS 1979 National Computer Conference, Vol. 48, pp. 313\u2013317, 1979.","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"2","key":"19_CR5","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/357360.357368","volume":"1","author":"M. Blum","year":"1993","unstructured":"M. Blum, How to Exchange (Secret) Keys, ACM Transactions of Computer Systems, vol. 1, No. 2, pp. 175\u2013193, 1993.","journal-title":"ACM Transactions of Computer Systems"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1023\/A:1016501125022","volume":"26","author":"C. Blundo","year":"2002","unstructured":"C. Blundo, B. Masucci, D.R. Stinson and R. Wei, Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes, Designs, Codes, and Cryptography, Vol. 26, pp. 97\u2013110, 2002.","journal-title":"Designs, Codes, and Cryptography"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"G. Brassard, C. Crep\u00e9au, and J.-M. Roberts, Information Theoretic Reductions Among Disclosure Problems, Proceedings of 27th IEEE Symposium on Foundations of Computer Science, pp. 168\u2013173, 1986.","DOI":"10.1109\/SFCS.1986.26"},{"key":"19_CR8","first-page":"234","volume":"263","author":"G. Brassard","year":"1987","unstructured":"G. Brassard, C. Crep\u00e9au, and J.-M. Roberts, All-or-Nothing Disclosure of Secrets, Advances in Cryptology: Crypto\u2019 86, Springer-Verlag, vol. 263, pp. 234\u2013238, 1987.","journal-title":"Advances in Cryptology: Crypto\u2019 86"},{"issue":"6","key":"19_CR9","doi-asserted-by":"publisher","first-page":"1769","DOI":"10.1109\/18.556673","volume":"42","author":"G. Brassard","year":"1996","unstructured":"G. Brassard, C. Crep\u00e9au, and M. S\u00e1ntha, Oblivious Transfer and Intersecting Codes, IEEE Transaction on Information Theory, special issue in coding and complexity, Vol. 42, No. 6, pp. 1769\u20131780, 1996.","journal-title":"IEEE Transaction on Information Theory, special issue in coding and complexity"},{"key":"19_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/3-540-46766-1_7","volume-title":"Advances in cryptology-CRYPTO\u201991","author":"R.M. Capocelli","year":"1992","unstructured":"R.M. Capocelli, A. De Santis, L. Gargano and U. Vaccaro, On the Size of the Shares in Secret Sharing Schemes, Advances in cryptology-CRYPTO\u201991, Lecture Notes in Computer Science, vol. 576, pp. 101\u2013113, 1992."},{"key":"19_CR11","unstructured":"B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, Private Information Retrieval, Proc. 36th IEEE Symposium on Foundations of Computer Science (FOCS), 1995, 41\u201350."},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"T. M. Cover and J. A. Thomas, Elements of Information Theory, John Wiley amp;Sons, 1991.","DOI":"10.1002\/0471200611"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"C. Crep\u00e9au, Equivalence between to flavors of oblivious transfers, Advances in Cryptology: Proceedings of Crypto\u2019 87, vol. 293, pp. 350\u2013354, Springer Verlag, 1988.","DOI":"10.1007\/3-540-48184-2_30"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"C. Crep\u00e9au, A Zero-Knowledge Poker Protocol that achieves confidentiality of the players\u2019 strategy or how to achieve an electronic poker face, Advances in Cryptology: Proceedings of Crypto\u2019 86, Springer-Verlag, pp. 239\u2013247, 1987.","DOI":"10.1007\/3-540-47721-7_18"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"G. Di Crescenzo, Y. Ishai, and R. Ostrovsky, Universal Service-Providers for Database private Information Retrieval, Proc. of Seventeenth Annual ACM Symposium on Principles of Distributed Computing (PODC), 1998.","DOI":"10.1145\/277697.277713"},{"key":"19_CR16","first-page":"87","volume":"2259","author":"P. D\u2019Arco","year":"2001","unstructured":"P. D\u2019Arco and D.R. Stinson, Generalized Zig-zag Functions and Oblivious Transfer Reductions, Selected Areas in Cryptography SAC 2001, vol. 2259, pp. 87\u2013103, 2001.","journal-title":"Selected Areas in Cryptography SAC 2001"},{"key":"19_CR17","unstructured":"Y. Dodis and S. Micali, Lower Bounds for Oblivious Transfer Reduction, Advances in Cryptology: Proceedings of Eurocrypt\u2019 99, vol. 1592, pp. 42\u201354, Springer Verlag, 1999."},{"key":"19_CR18","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S. Even","year":"1985","unstructured":"S. Even, O. Goldreich, and A. Lempel, A Randomized Protocol for Signing Contracts, Communications of the ACM 28, pp. 637\u2013647, 1985.","journal-title":"Communications of the ACM"},{"issue":"3","key":"19_CR19","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s001459900011","volume":"9","author":"M. Fisher","year":"1996","unstructured":"M. Fisher, S. Micali, and C. Racko., A Secure Protocol for the Oblivious Transfer, Journal of Cryptology, vol. 9, No. 3, pp. 191\u2013195, 1996.","journal-title":"Journal of Cryptology"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin, Protecting Data Privacy in Private Information Retrieval Schemes, Proc. of the 30th Annual ACM Symposium on Theory of Computing (STOC), 1998, pp. 151\u2013160.","DOI":"10.1145\/276698.276723"},{"key":"19_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/3-540-49543-6_17","volume-title":"RANDOM 1998","author":"Y. Gertner","year":"1998","unstructured":"Y. Gertner, S. Goldwasser, and T. Malkin, A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication, RANDOM 1998, Lecture Notes in Computer Science, Vol. 1518, pp. 200\u2013217, 1998."},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Y. Gertner, S. Kannan, T. Malkin, O. Reingold, and M. Viswanathan, The Relationship between Public Key Encryption and Oblivious Transfer, Proceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS 2000), pp. 325\u2013339, 2000.","DOI":"10.1109\/SFCS.2000.892121"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson, How to play ANY mental game or: A Completeness Theorem for Protocols with Honest Majority, Proceedings of 19th Annual Symposium on Theory of Computing, pp. 20\u201331, 1987.","DOI":"10.1145\/28395.28420"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"J. Kilian, Founding Cryptography on Oblivious Transfer, Proceedings of 20th Annual Symposium on Theory of Computing, pp. 20\u201331, 1988.","DOI":"10.1145\/62212.62215"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"M. Naor and B. Pinkas, Distributed Oblivious Transfer, Advances in Cryptology: Proceedings of Asiacrypt\u2019 00, Springer-Verlag, pp. 205\u2013219, 2000.","DOI":"10.1007\/3-540-44448-3_16"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"M. Naor, B. Pinkas, and R. Sumner, Privacy Preserving Auctions and Mechanism Design, ACM Conference on Electronic Commerce, 1999 available at http:\/\/www.wisdom.weizmann.ac.il\/naor\/onpub.html","DOI":"10.1145\/336992.337028"},{"key":"19_CR27","unstructured":"M. Rabin, How to Exchange Secrets by Oblivious Transfer, Technical Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981."},{"key":"19_CR28","unstructured":"R. Rivest, Unconditionally Secure Committment and Oblivious Transfer Schemes Using Private Channels and a Trusted Initializer, manuscript. Available: http:\/\/theory.lcs.mit.edu\/~rivest\/publications.html"},{"issue":"11","key":"19_CR29","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to Share a Secret. Communications of ACM, vol. 22, n. 11, pp. 612\u2013613, 1979.","journal-title":"Communications of ACM"},{"key":"19_CR30","unstructured":"D.R. Stinson. Bibliography on Secret Sharing Schemes. http:\/\/www.cacr.math.uwaterloo.ca\/~dstinson\/ssbib.html ."},{"key":"19_CR31","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BF00125203","volume":"2","author":"D.R. Stinson","year":"1992","unstructured":"D.R. Stinson. An explication of secret sharing schemes. Des. Codes Cryptogr., 2, 357\u2013390, 1992.","journal-title":"Des. Codes Cryptogr"},{"key":"19_CR32","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/3-540-45664-3_11","volume-title":"Efficient 1-out-of-n Oblivious Transfer Schemes","author":"W. Tzeng","year":"2002","unstructured":"W. Tzeng, Efficient 1-out-of-n Oblivious Transfer Schemes, Proceedings of PKC 2002, Lecture Notes in Computer Science, Vol. 2274, pp. 159\u2013171, 2002."},{"key":"19_CR33","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1008908.1008920","volume":"15","author":"S. Wiesner","year":"1983","unstructured":"S. Wiesner, Conjugate Coding, SIGACT News 15, pp. 78\u201388, 1983.","journal-title":"SIGACT News"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T21:09:54Z","timestamp":1737493794000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_19"}},"subtitle":["Extended Abstract"],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}