{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T08:32:31Z","timestamp":1775809951316,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540615125","type":"print"},{"value":"9783540686972","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68697-5_26","type":"book-chapter","created":{"date-parts":[[2007,11,8]],"date-time":"2007-11-08T22:10:00Z","timestamp":1194559800000},"page":"343-357","source":"Crossref","is-referenced-by-count":79,"title":["Quantum Key Distribution and String Oblivious Transfer in Noisy Channels"],"prefix":"10.1007","author":[{"given":"Dominic","family":"Mayers","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"issue":"21","key":"26_CR1","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C.H. Bennett","year":"1992","unstructured":"C.H. Bennett, Quantum cryptography using any two nonorthogonal states, Physical Review Letters, vol. 68, no. 21, 25 May 1992, pp. 3121\u20132124.","journal-title":"Physical Review Letters"},{"key":"26_CR2","unstructured":"C.H. Bennett, G. Brassard, Quantum Cryptography: Public key distribution and coin tossing, Proc. of IEEE International Conference on Computers, Systems, and Signal Processing, Banglore, India, December 1984, pp. 175\u2013179."},{"issue":"4","key":"26_CR3","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/74074.74087","volume":"20","author":"C.H. Bennett","year":"1989","unstructured":"C.H. Bennett and G. Brassard, The dawn of a new era for quantum cryptography: The experimental prototype is working!, Sigact News, vol. 20, no. 4, 1989, pp. 78\u201382.","journal-title":"Sigact News"},{"issue":"1","key":"26_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"C.H. Bennett","year":"1992","unstructured":"C.H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, Experimental quantum cryptography, Journal of Cryptology, vol. 5, no. 1, 1992, pp. 3\u201328. Preliminary version in Advances in Cryptology-Eurocrypt\u2019 90 Proceedings, May 1990, Springer-Verlag, pp. 253\u2013265.","journal-title":"Journal of Cryptology"},{"key":"26_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-46766-1_29","volume-title":"proceedings of CRYPTO\u201991","author":"C.H. Bennett","year":"1992","unstructured":"C.H. Bennett, G. Brassard, C. Cr\u00e9peau, M.-H. Skubiszewska, Practical Quantum Oblivious Transfer, In proceedings of CRYPTO\u201991, Lecture Notes in Computer Science, vol. 576, Springer-Verlag, Berlin, 1992, pp. 351\u2013366."},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"G. Brassard, C. Cr\u00e9peau, M. S\u00e1ntha, Oblivious Transfers and Intersecting Codes, IEEE Transactions in Information Theory, 1996, (to appear).","DOI":"10.1109\/18.556673"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"C.H. Bennett, T. Mor, J. Smolin, The Parity Bit in Quantum Cryptography, Los Alamos preprint archive quant-ph\/9604040, April 1996.","DOI":"10.1103\/PhysRevA.54.2675"},{"key":"26_CR8","unstructured":"E. Biham, T. Mor, On the Security of Quantum Cryptography Against Collective Attacks Los Alamos preprint archive quant-ph\/9605007, May 1996."},{"issue":"5","key":"26_CR9","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"8","author":"C.H. Bennett","year":"1992","unstructured":"C.H. Bennett, G. Brassard and N.D. Mermin, Quantum cryptography without Bell\u2019s theorem, Physical Review Letters, vol. 8, no. 5, 3 February 1992, pp. 557\u2013559.","journal-title":"Physical Review Letters"},{"key":"26_CR10","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1103\/PhysRevLett.76.722","volume":"76","author":"C.H. Bennett","year":"1996","unstructured":"C.H. Bennett, G. Brassard, S. Popescu, B. Schumacher, J. Smolin and W.K. Wootters, Purification of Noisy Entanglement and Faithful Teleportation via Noizy Channels. Physical Review Letters, vol. 76, pp. 722 (1996).","journal-title":"Physical Review Letters"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"C. Cr\u00e9peau, Equivalence Between Two Flavors of Oblivious Transfers, Advances in Cryptology \u2014 Crypto\u2019 87 Proceeding, August 1987, Springer-Verlag, pp. 350\u2013354.","DOI":"10.1007\/3-540-48184-2_30"},{"key":"26_CR12","unstructured":"C. Cr\u00e9peau, Correct and Private Reductions among Oblivious Transfers, Ph.D. Thesis, Massachusetts Institute of Technology, 1990."},{"issue":"12","key":"26_CR13","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.1080\/09500349414552291","volume":"41","author":"C. Cr\u00e9peau","year":"1994","unstructured":"C. Cr\u00e9peau, Quantum oblivious transfer, Journal of Modern Optics, vol. 41, no. 12, December 1994, pp. 2445\u20132454.","journal-title":"Journal of Modern Optics"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, A. Sanpera, Quantum privacy amplification and the security of quantum cryptography over noizy channels. Los Alamos preprint archive quant-ph\/9604039, April 1996.","DOI":"10.1103\/PhysRevLett.77.2818"},{"issue":"6","key":"26_CR15","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A.K. Ekert","year":"1991","unstructured":"A.K. Ekert, Quantum cryptography based on Bell\u2019s theorem, Physical Review Letters, vol. 67, no. 6, 5 August 1991, pp. 661\u2013663.","journal-title":"Physical Review Letters"},{"key":"26_CR16","unstructured":"R.J. Hughes, G. G. Luther, G. L. Morgan, C. G. Peterson and C. Simmons Quantum cryptography over underground optical fibers, Advances in Cryptology: Proceeding of CRYPTO\u201996."},{"key":"26_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/3-540-44750-4_10","volume-title":"Advances in Cryptology: Proceeding of CRYPTO\u201995","author":"D. Mayers","year":"1995","unstructured":"D. Mayers, On the security of the Quantum Oblivious Transfer and Key Distribution protocols, Advances in Cryptology: Proceeding of CRYPTO\u201995, Lecture Notes in Computer Science, vol. 963, Springer-Verlag, Berlin, 1995, pp. 124\u2013135."},{"key":"26_CR18","unstructured":"D. Mayers explained the details of his attack against the BCJL protocol at the 4th workshop on quantum information theory organized by G. Brassard in Montr\u00e9al, October 1995."},{"key":"26_CR19","unstructured":"D. Mayers, The Trouble with Quantum Bit Commitment, Los Alamos preprint archive quant-ph\/9603015, Mars 1996."},{"key":"26_CR20","unstructured":"D. Mayers, Unconditionally Secure Quantum Bit Commitment is impossible (to be published)."},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"D. Mayers and L. Salvail, Quantum Oblivious Transfer is Secure Against All Individual Measurements, Proceedings of the workshop on Physics and Computation, PhysComp\u2019 94, Dallas, Nov 1994, pp. 69\u201377.","DOI":"10.1109\/PHYCMP.1994.363696"},{"issue":"6","key":"26_CR22","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1209\/0295-5075\/23\/6\/001","volume":"23","author":"A. Muller","year":"1993","unstructured":"A. Muller, J. Breguet and N. Gisin, Experimental demonstration of quantum cryptography using polarized photons in optical fibre over more than 1 km, Europhysics Letters, vol. 23, no. 6, 20 August 1993, pp. 383\u2013388.","journal-title":"Europhysics Letters"},{"issue":"12","key":"26_CR23","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1080\/09500349414552281","volume":"41","author":"J.G. Rarity","year":"1994","unstructured":"J.G. Rarity, P.C.M. Owens and P.R. Tapster, Quantum random number generation and key sharing, Journal of Modern Optics, vol. 41, no. 12, December 1994, pp. 2435\u20132444.","journal-title":"Journal of Modern Optics"},{"issue":"7","key":"26_CR24","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1049\/el:19930424","volume":"29","author":"P.D. Townsend","year":"1993","unstructured":"P.D. Townsend, J.G. Rarity and P.R. Tapster, Single photon interference in a 10 km long optical fibre interferometer, Electronics Letters, vol. 29, no. 7, April 1993, pp. 634\u2013635.","journal-title":"Electronics Letters"},{"issue":"14","key":"26_CR25","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1049\/el:19930862","volume":"29","author":"P.D. Townsend","year":"1993","unstructured":"P.D. Townsend, J.G. Rarity and P.R. Tapster, Enhanced single photon fringe visibility in a 10 km-long prototype quantum cryptography channel, Electronics Letters, vol. 29, no. 14, 8 July 1993, pp. 1291\u20131293.","journal-title":"Electronics Letters"},{"key":"26_CR26","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M.N. Wegman","year":"1981","unstructured":"M.N. Wegman, J.L. Carter, New hash function and their use in authentification and set equality, Journal of Computer and System Sciences, vol. 22, 1981, pp. 265\u2013279.","journal-title":"Journal of Computer and System Sciences"},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"A. Yao, Security of Quantum Protocols Against Coherent Measurements, in Proceedings of the 26th Symposium on the Theory of Computing, June 1995, pp. 67\u201375.","DOI":"10.1145\/225058.225085"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68697-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T08:27:59Z","timestamp":1556958479000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68697-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540615125","9783540686972"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/3-540-68697-5_26","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1996]]}}}