{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T23:28:29Z","timestamp":1769297309380,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540545088","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_4","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"49-61","source":"Crossref","is-referenced-by-count":39,"title":["Quantum Bit Commitment and Coin Tossing Protocols"],"prefix":"10.1007","author":[{"given":"Gilles","family":"Brassard","sequence":"first","affiliation":[]},{"given":"Claude","family":"Cr\u00e9peau","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Aspect, A. and P. Grangier, \u201cExperiments on Einstein \u2014 Podolsky \u2014 Rosen-type correlations with pairs of visible photons\u201d, in Quantum concepts in space and time (R. Penrose and C. J. Isham, eds.), Oxford University Press, 1986."},{"key":"4_CR2","unstructured":"Bennett, C.H., F. Bessette, G. Brassard, L. Salvail, and J. Smolin, \u201cExperimental quantum cryptography\u201d, Advances in Cyptology: Proceedings of Eurocrypt\u2019 90, Aarhus, Denmark, Springer-Verlag, to appear. Submitted to Journal of Cryptology."},{"key":"4_CR3","unstructured":"Bennett, C. H. and G. Brassard, \u201cQuantum cryptography: public key distribution and coin tossing\u201d, Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175\u2013179, 1984."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Bennett, C.H., G. Brassard, S. Breidbart, and S. Wiesner, \u201cQuantum cryptography, or unforgeable subway tokens\u201d, Advances in Cryptology: Proceedings of Crypto 82, Plenum Press, pp. 267\u2013275, 1983.","DOI":"10.1007\/978-1-4757-0602-4_26"},{"key":"4_CR5","unstructured":"Bennett, C. H., G. Brassard, and C. Cr\u00e9peau,\u201cPractical Quantum Oblivious Transfer\u201d, in preparation, 1990."},{"key":"4_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Modern Cryptology","author":"G. Brassard","year":"1988","unstructured":"Brassard, G., Modern Cryptology, Lecture Notes in Computer Science, Vol. 325, Springer-Verlag, 1988."},{"issue":"2","key":"4_CR7","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G. Brassard","year":"1988","unstructured":"Brassard, G., D. Chaum, and C. Cr\u00e9peau, \u201cMinimum disclosure proofs of knowledge\u201d, Journal of Computer and System Sciences, Vol. 37, no. 2, pp. 156\u2013189, 1988.","journal-title":"Journal of Computer and System Sciences"},{"key":"4_CR8","volume-title":"Three applications of the oblivious transfer: Part I: Coin flipping by telephone; Part II: How to exchange secrets; Part III: How to send certified electronic mail","author":"M. Blum","year":"1981","unstructured":"Blum. M., \u201cThree applications of the oblivious transfer: Part I: Coin flipping by telephone; Part II: How to exchange secrets; Part III: How to send certified electronic mail\u201d. Technical Report. Department of EECS, University of California, Berkeley, CA, 1981."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau, C. and J. Kilian, \u201cAchieving oblivious transfer using weakened security assumptions\u201d, Proceedings of the 29th IEEE Symposium on Foundations of Computer Science, pp. 42\u201352, 1988.","DOI":"10.1109\/SFCS.1988.21920"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1103\/PhysRev.47.777","volume":"47","author":"A. Einstein","year":"1935","unstructured":"Einstein, A., P. Podolsky, and S. Rosen, \u201cCan quantum-mechanical description of physical reality be considered complete?\u201d, Physical Review, Vol. 47, pp. 777\u2013780, 1935. Reprinted in Quantum theory and measurement (J. A. Wheeler and W. Z. Zurek, eds.), Princeton University Press, 1983.","journal-title":"Physical Review"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Even, S., O. Goldreich, and A. Lempel, \u201cA randomized protocol for signing contracts\u201d, Advances in Cryptology: Proceedings of Crypto 82, Plenum Press, pp. 205\u2013210, 1983.","DOI":"10.1007\/978-1-4757-0602-4_19"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Goldreich, O., S. Micali, and A. Wigderson, \u201cProofs that yield nothing but their validity and a methodology of cryptographic protocol design\u201d, Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp. 174\u2013187, 1986.","DOI":"10.1109\/SFCS.1986.47"},{"key":"4_CR13","unstructured":"Rabin, M. O., \u201cHow to exchange secrets by oblivious transfer\u201d, Technical Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981."},{"issue":"1","key":"4_CR14","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1008908.1008920","volume":"15","author":"S. Wiesner","year":"1983","unstructured":"Wiesner, S., \u201cConjugate coding\u201d, Sigact News, Vol. 15, no. 1, pp. 78\u201388, 1983. manuscript written circa 1969, unpublished until it appeared in Sigact News.","journal-title":"Sigact News"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:20:18Z","timestamp":1619572818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_4","relation":{},"subject":[]}}