{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T11:07:06Z","timestamp":1776942426361,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540602217","type":"print"},{"value":"9783540447504","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_8","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T04:39:53Z","timestamp":1187239193000},"page":"97-109","source":"Crossref","is-referenced-by-count":142,"title":["Precomputing Oblivious Transfer"],"prefix":"10.1007","author":[{"given":"Donald","family":"Beaver","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"8_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/3-540-47555-9_24","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 92 Proceedings","author":"D. Beaver","year":"1993","unstructured":"D. Beaver. \u201cHow to Break a\u2019 secure\u2019 Oblivious Transfer Protocol.\u201d Advances in Cryptology \u2014 Eurocrypt\u2019 92 Proceedings, Springer-Verlag LNCS 658, 1993, 285\u2013296."},{"key":"8_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/0-387-34805-0_48","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 89 Proceedings","author":"M. Bellare","year":"1990","unstructured":"M. Bellare, S. Micali. \u201cNon-Interactive Oblivious Transfer and Applications.\u201d Advances in Cryptology \u2014 Crypto\u2019 89 Proceedings, Springer-Verlag LNCS 435, 1990, 547\u2013557."},{"key":"8_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-46766-1_29","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 91 Proceedings","author":"C. Bennett","year":"1992","unstructured":"C. Bennett, G. Brassard, C. Cr\u00e9peau, M. Skubiszewska. \u201cPractical Quantum Oblivious Transfer.\u201d Advances in Cryptology \u2014 Crypto\u2019 91 Proceedings, Springer-Verlag LNCS 576, 1992, 351\u2013366."},{"key":"8_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/3-540-46877-3_4","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 91 Proceedings","author":"B. Boer den","year":"1991","unstructured":"B. den Boer. \u201cOblivious Transfer Protecting Secrecy.\u201d Advances in Cryptology \u2014 Eurocrypt\u2019 91 Proceedings, Springer-Verlag LNCS 547, 1991, 31\u201345."},{"key":"8_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-38424-3_4","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 90 Proceedings","author":"G. Brassard","year":"1991","unstructured":"G. Brassard, C. Cr\u00e9peau. \u201cQuantum Bit Commitment and Coin Tossing Protocols.\u201d Advances in Cryptology \u2014 Crypto\u2019 90 Proceedings, Springer-Verlag LNCS 537, 1991, 49\u201361."},{"key":"8_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 86 Proceedings","author":"G. Brassard","year":"1987","unstructured":"G. Brassard, C. Cr\u00e9peau, J. Robert. \u201cAll or Nothing Disclosure of Secrets.\u201d Advances in Cryptology \u2014 Crypto\u2019 86 Proceedings, Springer-Verlag LNCS 263, 1987."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"G. Brassard, C. Cr\u00e9peau, J. Robert. \u201cInformation Theoretic Reductions among Disclosure Problems.\u201d Proceedings of the 27th FOCS, IEEE, 1986, 168\u2013173.","DOI":"10.1109\/SFCS.1986.26"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Y-H. Chen, T. Hwang, C-M. Li. \u201cOn the Zero Knowledge Proof Systems Based on One-out-of-two Non-Interactive Oblivious Transfers.\u201d Manuscript, 1994.","DOI":"10.1016\/0140-3664(96)81600-8"},{"key":"8_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1007\/3-540-48184-2_30","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 87 Proceedings","author":"C. Cr\u00e9peau","year":"1988","unstructured":"C. Cr\u00e9peau. \u201cEquivalence Between Two Flavours of Oblivious Transfers.\u201d Advances in Cryptology \u2014 Crypto\u2019 87 Proceedings, Springer-Verlag LNCS 293, 1988, 350\u2013354."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"C. Cr\u00e9peau, J. Kilian. \u201cAchieving Oblivious Transfer Using Weakened Security Assumptions.\u201d Proceedings of the 29 th FOCS, IEEE, 1988, 42\u201352.","DOI":"10.1109\/SFCS.1988.21920"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"S. Even, O. Goldreich, A. Lempel. \u201cA Randomized Protocol for Signing Contracts.\u201d Proceedings of Crypto 1982, Springer-Verlag, 1983, 205\u2013210.","DOI":"10.1007\/978-1-4757-0602-4_19"},{"issue":"10","key":"8_CR12","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1049\/el:19900416","volume":"26","author":"L. Harn","year":"1990","unstructured":"L. Harn, H. Lin. \u201cNoninteractive Oblivious Transfer.\u201d Electronics Letters 26:10 (May 1990), 635\u2013636.","journal-title":"Electronics Letters"},{"key":"8_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1007\/3-540-57332-1_26","volume-title":"Advances in Cryptology \u2014 Asiacrypt\u2019 91 Proceedings","author":"L. Harn","year":"1993","unstructured":"L. Harn. \u201cAn Oblivious Transfer Protocol and Its Application for the Exchange of Secrets.\u201d Advances in Cryptology \u2014 Asiacrypt\u2019 91 Proceedings, Springer-Verlag LNCS 739, 1993, 312\u2013320."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"J. Kilian. \u201cFounding Cryptography on Oblivious Transfer.\u201d Proceedings of the 20th STOC, ACM, 1988, 20\u201329.","DOI":"10.1145\/62212.62215"},{"key":"8_CR15","unstructured":"M. Rabin. \u201cHow to Exchange Secrets by Oblivious Transfer.\u201d TR-81, Harvard, 1981."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:19:25Z","timestamp":1556756365000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_8","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1995]]}}}