{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:56:48Z","timestamp":1742385408000},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540629757"},{"type":"electronic","value":"9783540690535"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_23","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:24:05Z","timestamp":1186349045000},"page":"334-347","source":"Crossref","is-referenced-by-count":16,"title":["Oblivious Transfers and Privacy Amplification"],"prefix":"10.1007","author":[{"given":"Gilles","family":"Brassard","sequence":"first","affiliation":[]},{"given":"Claude","family":"Cr\u00e9peau","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"issue":"6","key":"23_CR1","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"C. H. Bennett","year":"1995","unstructured":"C. H. Bennett, G. Brassard, C. Cr\u00e9peau and U. M. Maurer, \u201cGeneralized privacy amplification\u201d, IEEE Transaction on Information Theory, Vol. 41, no. 6, November 1995, pp. 1915\u20131923.","journal-title":"IEEE Transaction on Information Theory"},{"issue":"2","key":"23_CR2","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"C. H. Bennett","year":"1988","unstructured":"C. H. Bennett, G. Brassard and J.-M. Robert, \u201cPrivacy amplification by public discussion\u201d, SIAM Journal on Computing, Vol. 17, no. 2, April 1988, pp. 210\u2013229.","journal-title":"SIAM Journal on Computing"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"G. Brassard, C. Cr\u00e9peau and J.-M. Robert, \u201cInformation theoretic reductions among disclosure problems\u201d, Proceedings of 27th Annual IEEE Symposium on Foundations of Computer Science, 1986, pp. 168\u2013173.","DOI":"10.1109\/SFCS.1986.26"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"G. Brassard, C. Cr\u00e9peau and J.-M. Robert, \u201cAll-or-nothing disclosure of secrets\u201d, Advances in Cryptology: Proceedings of Crypto\u2019 86, Springer-Verlag, 1987, pp. 234\u2013238.","DOI":"10.1007\/3-540-47721-7_17"},{"issue":"6","key":"23_CR5","doi-asserted-by":"publisher","first-page":"1769","DOI":"10.1109\/18.556673","volume":"42","author":"G. Brassard","year":"1996","unstructured":"G. Brassard, C. Cr\u00e9peau and M. S\u00e1ntha, \u201cOblivious transfers and intersecting codes\u201d, IEEE Transactions on Information Theory, Vol. 42, no. 6, November 1996, pp. 1769\u20131780.","journal-title":"IEEE Transactions on Information Theory"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"C. Cachin, \u201cSmooth entropy and R\u00e9nyi entropy\u201d, Advances in Cryptology: Proceedings of Eurocrypt\u2019 97, Springer-Verlag, 1997.","DOI":"10.1007\/3-540-69053-0_14"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"J. L. Carter","year":"1981","unstructured":"J. L. Carter and M. N. Wegman, \u201cNew hash functions and their use in authentication and set equality\u201d, Journal of Computer and System Sciences, Vol. 22, 1981, pp. 265\u2013279.","journal-title":"Journal of Computer and System Sciences"},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/0012-365X(85)90190-6","volume":"56","author":"G. D. Cohen","year":"1985","unstructured":"G. D. Cohen and A. Lempel, \u201cLinear intersecting codes\u201d, Discrete Mathematics, Vol. 56, 1985, pp. 35\u201343.","journal-title":"Discrete Mathematics"},{"issue":"6","key":"23_CR9","doi-asserted-by":"publisher","first-page":"1872","DOI":"10.1109\/18.340462","volume":"40","author":"G. D. Cohen","year":"1994","unstructured":"G. D. Cohen and G. Z\u00e9mor, \u201cIntersecting codes and independent families\u201d, IEEE Transactions on Information Theory, Vol. 40, no. 6, November 1994, pp. 1872\u20131881.","journal-title":"IEEE Transactions on Information Theory"},{"key":"23_CR10","unstructured":"C. Cr\u00e9peau, \u201cVerifiable disclosure of secrets and application\u201d, Advances in Cryptology: Proceedings of Eurocrypt\u2019 89, Springer-Verlag, 1990, pp. 181\u2013191."},{"key":"23_CR11","unstructured":"C. Cr\u00e9peau, Correct and Private Reductions Among Oblivious Transfers, PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1990. Supervised by Silvio Micali."},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"C. Cr\u00e9peau, J. van de Graaf and A. Tapp, \u201cCommitted oblivious transfer and private multi-party computations\u201d, Advances in Cryptology: Proceedings of Crypto\u2019 95, Springer-Verlag, 1995, pp. 110\u2013123.","DOI":"10.1007\/3-540-44750-4_9"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"C. Cr\u00e9peau and M. S\u00e1ntha, \u201cOn the reversibility of oblivious transfer\u201d, Advances in Cryptology: Proceedings of Eurocrypt\u2019 91, Springer-Verlag, 1991, pp. 106\u2013113.","DOI":"10.1007\/3-540-46416-6_9"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"C. Cr\u00e9peau and M. S\u00e1ntha, \u201cEfficient reductions among oblivious transfer protocols based on new self-intersecting codes\u201d, Sequences II, Methods in Communications, Security and Computer Science, Springer-Verlag, 1991, pp. 360\u2013368.","DOI":"10.1007\/978-1-4613-9323-8_27"},{"key":"23_CR15","first-page":"205","volume-title":"Proceedings of Crypto 82","author":"S. Even","year":"1983","unstructured":"S. Even, O. Goldreich and A. Lempel, \u201cA randomized protocol for signing contracts\u201d, Proceedings of Crypto 82, Plenum Press, New York, 1983, pp. 205\u2013210."},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali and C. Rackoff, \u201cThe knowledge complexity of interactive proof-systems\u201d, SIAM Journal on Computing, Vol. 18, 1989, pp. 186\u2013208.","journal-title":"SIAM Journal on Computing"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"J. Kilian, \u201cFounding cryptography on oblivious transfer\u201d, Proceedings of 20th Annual ACM Symposium on Theory of Computing, 1988, pp. 20\u201331.","DOI":"10.1145\/62212.62215"},{"key":"23_CR18","unstructured":"M. O. Rabin, \u201cHow to exchange secrets by oblivious transfer\u201d, Technical Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981."},{"key":"23_CR19","unstructured":"A. R\u00e9nyi, Probability Theory, North Holland, 1970."},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"D. R. Stinson, Private communication, 12 February 1997.","DOI":"10.1023\/A:1008268610932"},{"issue":"1","key":"23_CR21","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1008908.1008920","volume":"15","author":"S. Wiesner","year":"1983","unstructured":"S. Wiesner, \u201cConjugate coding\u201d, Sigact News, Vol. 15, no. 1, 1983, pp. 78\u201388. Original manuscript written circa 1970.","journal-title":"Sigact News"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T15:31:51Z","timestamp":1556724711000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_23","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1997]]}}}