{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:25:41Z","timestamp":1725488741244},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540428800"},{"type":"electronic","value":"9783540456001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45600-7_4","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T12:21:49Z","timestamp":1186834909000},"page":"35-41","source":"Crossref","is-referenced-by-count":1,"title":["Unconditionally-Secure Oblivious Transfer"],"prefix":"10.1007","author":[{"given":"Bo","family":"Yang","sequence":"first","affiliation":[]},{"given":"Shixiong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yumin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"4_CR1","unstructured":"M. O. Rabin. How to exchange secrets by oblivious transfer, Tech. Report TR-81, Harvard, 1981."},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Shimon Even, Oded Goldreich, and A. Lempel. A randomized protocol for signing contracts, CRYPTO\u201982, Plenum Press, 1983, 205\u2013210.","DOI":"10.1007\/978-1-4757-0602-4_19"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Gilles Brassard, Claude Cr\u00e9peau, and Jean-Marc Robert, Information theoretic reductions among disclosure problems, Proc. 27th IEEE Symposium on Foundations of Computer Science, 1986,168\u2013173.","DOI":"10.1109\/SFCS.1986.26"},{"key":"4_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/BFb0054139","volume-title":"EUROCRYPT\u201998","author":"C. Cachin","year":"1998","unstructured":"Christian Cachin. On the foundations of oblivious transfer, EUROCRYPT\u201998, Lecture Notes in Computer Science, Springer-Verlag, 1998, 361\u2013374."},{"key":"4_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1007\/3-540-69053-0_23","volume-title":"EUROCRYPT\u2019 97","author":"G. Brassard","year":"1997","unstructured":"Gilles Brassard, Claude Cr\u00e9peau. Oblivious transfer and privacy amplification, EUROCRYPT\u2019 97, Lecture Notes in Computer Science, Springer-Verlag, 1997, 334\u2013347."},{"issue":"6","key":"4_CR6","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"C. H. Bennett","year":"1995","unstructured":"Charles H. Bennett, Gilles Brassard, Claude Cr\u00e9peau, and Ueli M. Maurer. Generalized Privacy amplification, IEEE Trans. Inform. Theory, 1995, 41 (6): 1915\u20131923.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"4_CR7","unstructured":"Bo Yang, Tong Zhang and Yumin Wang. Distillation of Unconditionally-Secure Secret-Key Based on Smooth Entropy. Acta Electronica Sinica, 2001, 29(7)."},{"key":"4_CR8","unstructured":"Bo Yang, Tong Zhang and Yumin Wang. Distillation of Unconditionally-Secure Secret-Key against Active Adversaries Based on Smooth Entropy. Acta Electronica Sinica, accepted to publish."},{"key":"4_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/3-540-69053-0_14","volume-title":"EUROCRYPT\u201997","author":"C. Cachin","year":"1997","unstructured":"Christian Cachin. Smooth entropy and R\u00e9nyi entropy, EUROCRYPT\u201997, Lecture Notes in Computer Science, Springer-Verlag, 1997, 193\u2013208."},{"issue":"2","key":"4_CR10","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J. L. Carter","year":"1979","unstructured":"J. L. Carter and M. N. Wegman. Universal classes of hash functions, J.Comput.Syst.Sci., 1979, 18 (2): 143\u2013154.","journal-title":"J.Comput.Syst.Sci."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45600-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T23:21:14Z","timestamp":1556752874000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45600-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540428800","9783540456001"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45600-7_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}