{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:38:58Z","timestamp":1725489538239},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602217"},{"type":"electronic","value":"9783540447504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_10","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T04:39:53Z","timestamp":1187239193000},"page":"124-135","source":"Crossref","is-referenced-by-count":10,"title":["On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols"],"prefix":"10.1007","author":[{"given":"Dominic","family":"Mayers","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"10_CR1","unstructured":"C.H. Bennett, G. Brassard, Quantum Cryptography: Public key distribution and coin tossing, Proc. of IEEE International Conference on Computers, Systems, and Signal Processing, Banglore, India, December 1984, pp. 175\u2013179."},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"C.H. Bennett","year":"1992","unstructured":"C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, Experimental quantum cryptography, Journal of Cryptology, vol. 5, no. 1, 1992, pp. 3\u201328. Previous version in Advances in Cryptology \u2014 Eurocrypt\u2019 90 Proceeding, May 1990, Springer \u2014 Verlag, pp. 253\u2013265.","journal-title":"Journal of Cryptology"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"C.H. Bennett, G. Brassard, S. Breidbart and S. Wiesner, Quantum cryptography, or unforgeable subway tokens, Advances in Cryptology: Crypto\u2019 82 Proceeding, August 1982, Plenum Press pp. 267\u2013275.","DOI":"10.1007\/978-1-4757-0602-4_26"},{"key":"10_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-46766-1_29","volume-title":"proceedings of CRYPTO\u201991","author":"C.H. Bennett","year":"1992","unstructured":"C.H. Bennett, G. Brassard, C. Cr\u00e9peau, M.-H. Skubiszewska, Practical Quantum Oblivious Transfer, In proceedings of CRYPTO\u201991, Lecture Notes in Computer Science, vol. 576, Springer \u2014 Verlag, Berlin, 1992, pp. 351\u2013366."},{"key":"10_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-38424-3_4","volume-title":"Advances in Cryptology: Proceeding of CRYPTO\u201990","author":"G. Grassard","year":"1991","unstructured":"G. Grassard and C. Cr\u00e9peau, Quantum bit commitment and coin tossing protocols, in Advances in Cryptology: Proceeding of CRYPTO\u201990, Lecture Notes in Computer Science, vol. 537, Springer \u2014 Verlag, Berlin, 1991, pp. 49\u201361."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"G. Brassard, C. Cr\u00e9peau, R. Jozsa, D. Langlois, A quantum bit commitment scheme provably unbreakable by both parties, in Proceeding of the 34th annual IEEE Symposium on Foundations of Computer Science, November 1993, pp. 362\u2013371.","DOI":"10.1109\/SFCS.1993.366851"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"C. Cr\u00e9peau, Equivalence Between Two Flavors of Oblivious Transfers, Advances in Cryptology \u2014 Crypto\u2019 87 Proceeding, August 1987, Springer \u2014 Verlag, pp. 350\u2013354.","DOI":"10.1007\/3-540-48184-2_30"},{"key":"10_CR8","unstructured":"C. Cr\u00e9peau, Correct and Private Reductions among Oblivious Transfers, Ph.D. Thesis, Massachusetts Institute of Technology, 1990."},{"issue":"12","key":"10_CR9","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.1080\/09500349414552291","volume":"41","author":"C. Cr\u00e9peau","year":"1994","unstructured":"C. Cr\u00e9peau, Quantum oblivious transfer, Journal of Modern Optics, vol. 41, no. 12, December 1994, pp. 2445\u20132454.","journal-title":"Journal of Modern Optics"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"C. Cr\u00e9peau, and L. Salvail, Quantum Oblivious Mutual Identification, Advances in Cryptology: Proceedings of Eurocrypt\u2019 95, May 1995, Springer \u2014 Verlag, to appear.","DOI":"10.1007\/3-540-49264-X_11"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"D. Mayers and L. Salvail, Quantum Oblivious Transfer is Secure Against All Individual Measurements, Proceedings of the workshop on Physics and Computation, PhysComp\u2019 94, Dallas, Nov 1994, pp. 69\u201377.","DOI":"10.1109\/PHYCMP.1994.363696"},{"key":"10_CR12","unstructured":"Marand, C. and P. Townsend, Quantum key distribution over distances up to 30km, Optics Letters, to appear."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"P.D. Townsend, Secure key distribution system based on quantum cryptography, Electronics Letters, Vol. 30, no. 10, 12 May 1994.","DOI":"10.1049\/el:19940558"},{"issue":"7","key":"10_CR14","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1049\/el:19930424","volume":"29","author":"P.D. Townsend","year":"1993","unstructured":"P.D. Townsend, J.G. Rarity and P.R. Tapster, Single pulse interference in a 10 km long optical fibre interferometer, Electronics Letters, vol. 29, no. 7, 1 April 1993, pp. 634\u2013635.","journal-title":"Electronics Letters"},{"issue":"14","key":"10_CR15","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1049\/el:19930862","volume":"29","author":"P.D. Townsend","year":"1993","unstructured":"P.D. Townsend, J.G. Rarity and P.R. Tapster, Enhanced single photon fringe visibility in a 10 km-long prototype quantum cryptography channel, Electronics Letters, vol. 29, no. 14, 8 July 1993, pp. 1291\u20131293.","journal-title":"Electronics Letters"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"A. Yao, Security of Quantum Protocols Against Coherent Measurements, in Proceedings of the 26th Symposium on the Theory of Computing, June 1995, to appear.","DOI":"10.1145\/225058.225085"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:18:12Z","timestamp":1556756292000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]}}}