{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:14:35Z","timestamp":1759637675002},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540551881"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46766-1_10","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T11:03:27Z","timestamp":1186830207000},"page":"141-155","source":"Crossref","is-referenced-by-count":25,"title":["Multiparty Secret Key Exchange Using a Random Deal of Cards"],"prefix":"10.1007","author":[{"given":"Michael J.","family":"Fischer","sequence":"first","affiliation":[]},{"given":"Rebecca N.","family":"Wright","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"D. Beaver, S. Haber, and P. Winkler. On the Isolation of a Common Secret, preprint, Bellcore, 1991."},{"key":"10_CR2","unstructured":"R. Beigel. 1991. (Private communication.)"},{"key":"10_CR3","volume-title":"Winning Ways","author":"E. R. Berlekamp","year":"1982","unstructured":"E. R. Berlekamp, J. H. Conway, and R. K. Guy. Winning Ways, Volume I, Academic Press Inc., London, 1982."},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"6","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman. New Directions in Cryptography. IEEE Trans. Inform. Theory, IT-22, Vol. 6. Nov. 1976, pp. 644\u2013654.","journal-title":"IEEE Trans. Inform. Theory, IT-22"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"M. J. Fischer, M. S. Paterson, and C. Rackoff. Secret Bit Transmission Using a Random Deal of Cards, Distributed Computing and Cryptography, American Mathematical Society, 1991, pp. 173\u2013181.","DOI":"10.1090\/dimacs\/002\/11"},{"key":"10_CR6","unstructured":"M. J. Fischer, P. Winkler, and R. N. Wright. June 1990. (Private communication.)"},{"key":"10_CR7","unstructured":"M. J. Fischer and R. N. Wright. Multiparty Secret Key Exchange Using a Random Deal of Cards, Technical Report YALEU\/DCS\/TR-855, Yale University, June 1991."},{"key":"10_CR8","unstructured":"J. Flint. Cheating by Degrees, The Times Saturday Review, May 9, 1981."},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"R. Impagliazzo and S. Rudich. Limits on the Provable Consequences of One-way Permutations, Proc. 21st ACM Symposium on Theory of Computing, May 1989, pp. 44\u201361.","DOI":"10.1145\/73007.73012"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"U. M. Maurer. Perfect Cryptographic Security from Partially Independent Channels, Proc. 23rd ACM Symposium on Theory of Computing, May 1991, pp. 561\u2013571.","DOI":"10.1145\/103418.103476"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/359460.359473","volume":"4","author":"R. C. Merkle","year":"1978","unstructured":"R. C. Merkle. Secure Communication over Insecure Channels, Comm. ACM 21, 4, April 1978, pp. 294\u2013299.","journal-title":"Comm. ACM 21"},{"key":"10_CR12","unstructured":"M. Rabin. Cryptography Without Secrets. Presented at DIMACS 1990 Workshop on Cryptography, Princeton, NJ. October 1\u20134, 1990."},{"key":"10_CR13","unstructured":"P. Winkler. Cryptologic Techniques in Bidding and Defense, Parts I, II, III, and IV, Bridge Magazine, April\u2013July, 1981."},{"key":"10_CR14","unstructured":"P. Winkler. My Night at the Cryppie Club, Bridge Magazine, August 1981, pp. 60\u201363."},{"issue":"4","key":"10_CR15","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1080\/0161-118391858053","volume":"7","author":"P. Winkler","year":"1983","unstructured":"P. Winkler. The Advent of Cryptology in the Game of Bridge, Cryptologia, Vol. 7, No. 4, October 1983, pp. 327\u2013332.","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46766-1_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:13:21Z","timestamp":1605629601000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46766-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540551881"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-46766-1_10","relation":{},"subject":[]}}