{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:37:25Z","timestamp":1725496645234},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545088"},{"type":"electronic","value":"9783540384243"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1991]]},"DOI":"10.1007\/3-540-38424-3_18","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T08:05:56Z","timestamp":1196669156000},"page":"253-266","source":"Crossref","is-referenced-by-count":8,"title":["Collective Coin Tossing Without Assumptions nor Broadcasting"],"prefix":"10.1007","author":[{"given":"Silvio","family":"Micali","sequence":"first","affiliation":[]},{"given":"Tal","family":"Rabin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,18]]},"reference":[{"key":"18_CR1","volume-title":"Interactive consistency in constant expected time","author":"M. Ben-Or","year":"1988","unstructured":"M. Ben-Or and R. El-Yaniv. Interactive consistency in constant expected time. Inst. of Math. and Comp. Sci., Hebrew University, Jerusalem, 1988."},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for fault-tolerant distributed computing. In Proc. 20th ACM Symposium on Theory of Computing, pages 1\u201310, Chicago, 1988. ACM.","DOI":"10.1145\/62212.62213"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols. In Proc. 22th ACM Symposium on Theory of Computing, May 1990.","DOI":"10.1145\/100216.100287"},{"key":"18_CR4","first-page":"313","volume":"48","author":"G. Blakely","year":"1979","unstructured":"G. Blakely. Safeguarding cryptographic keys. In AFIPS, volume 48, pages 313\u2013317. NCC, June 1979.","journal-title":"AFIPS"},{"key":"18_CR5","unstructured":"S. Goldwasser B. Awerbuch, B. Chor and S. Micali. Verifiable secret sharing in the presence of faults. In Proc. of the 27th Annual IEEE Symposium on Foundations of Computer Science, 1986."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"A.Z. Broder and D. Dolev. Flipping coins in many pockets (byzantine agreement on uniformly random values. In Proc. of the 25th Annual IEEE Symposium on Foundations of Computer Science, pages 157\u2013170. IEEE Computer Society Press, October 1984.","DOI":"10.1109\/SFCS.1984.715912"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"D. Chaum, C. Crepeau, and I. Damgard. Multi-party unconditionally secure protocols. In Proc. 20th ACM Symposium on Theory of Computing, Chicago, 1988. ACM.","DOI":"10.1145\/62212.62214"},{"key":"18_CR8","unstructured":"P. Feldman and S. Micali. An optimal algorithm for synchronous byzantine agreement. Technical Report LCS\/TM-425, MIT, June 1990. (Submitted for publication in SIAM J. on Computing.)."},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure falt-tolerant protocols and public-key model. In Proc. CRYPTO 87, pages 135\u2013155. Springer Verlag, 1987.","DOI":"10.1007\/3-540-48184-2_10"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. In Proc. of the 27th Annual IEEE Symposium on Foundations of Computer Science, pages 174\u2013187, Toronto, 1986. IEEE.","DOI":"10.1109\/SFCS.1986.47"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocoles with honest majority. In Proc. 21th ACM Symposium on Theory of Computing, 1989.","DOI":"10.1145\/73007.73014"},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to share a secret. Communications of the ACM, 22:612\u2013613, November 1979.","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T09:20:29Z","timestamp":1557048029000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991]]},"ISBN":["9783540545088","9783540384243"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1991]]}}}