{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T04:01:17Z","timestamp":1769313677970,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540210009","type":"print"},{"value":"9783540246381","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24638-1_21","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T15:15:28Z","timestamp":1280762128000},"page":"374-393","source":"Crossref","is-referenced-by-count":20,"title":["Computational Collapse of Quantum State with Application to Oblivious Transfer"],"prefix":"10.1007","author":[{"given":"Claude","family":"Cr\u00e9peau","sequence":"first","affiliation":[]},{"given":"Paul","family":"Dumais","sequence":"additional","affiliation":[]},{"given":"Dominic","family":"Mayers","sequence":"additional","affiliation":[]},{"given":"Louis","family":"Salvail","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/3-540-45841-7_26","volume-title":"STACS 2002","author":"M. Adcock","year":"2002","unstructured":"Adcock, M., Cleve, R.: A Quantum Goldreich-Levin Theorem with Cryptographic Applications. In: Alt, H., Ferreira, A. (eds.) STACS 2002. LNCS, vol.\u00a02285, pp. 323\u2013334. Springer, Heidelberg (2002)"},{"key":"21_CR2","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175\u2013179 (1984)"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-46766-1_29","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Skubiszewska, M.-H.: Practical Quantum Oblivious Transfer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 351\u2013366. Springer, Heidelberg (1992)"},{"issue":"12","key":"21_CR4","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.1080\/09500349414552291","volume":"41","author":"C. Cr\u00e9peau","year":"1994","unstructured":"Cr\u00e9peau, C.: Quantum Oblivious Transfer. Journal of Modern Optics\u00a041(12), 2445\u20132454 (1994)","journal-title":"Journal of Modern Optics"},{"key":"21_CR5","unstructured":"Cr\u00e9peau, C., Dumais, P., Mayers, D., Salvail, L.: Computational Collapse of Quantum State with Application to Oblivious Transfer (2003), full version of this paper, BRICS report nr. RS-03-37, available at: \n                  \n                    www.brics.dk\/RS\/03\/37"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions. In: Proceedings of 29th IEEE Symposium on the Foundations of Computer Science, pp. 42\u201352 (1988)","DOI":"10.1109\/SFCS.1988.21920"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/3-540-44987-6_5","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"C. Cr\u00e9peau","year":"2001","unstructured":"Cr\u00e9peau, C., L\u00e9gar\u00e9, F., Salvail, L.: How to Convert the Flavor of a Quantum Bit Commitment. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 60\u201377. Springer, Heidelberg (2001)"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/3-540-45539-6_21","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"P. Dumais","year":"2000","unstructured":"Dumais, P., Mayers, D., Salvail, L.: Perfectly Concealing Quantum Bit Commitment From Any Quantum One-Way Permutation. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 300\u2013315. Springer, Heidelberg (2000)"},{"key":"21_CR9","unstructured":"van de Graaf, J.: Towards a Formal Definition of Security for Quantum Protocols, Ph.D. thesis, Computer Science and Operational Research Department, Universit\u00e9 de Montr\u00e9al (1997)"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1007\/0-387-34799-2_2","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"R. Impagliazzo","year":"1990","unstructured":"Impagliazzo, R., Rudich, S.: Limits on the Provable Consequences of One-Way Permutations. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 8\u201326. Springer, Heidelberg (1990)"},{"issue":"17","key":"21_CR11","doi-asserted-by":"publisher","first-page":"3410","DOI":"10.1103\/PhysRevLett.78.3410","volume":"78","author":"H.\u2013K. Lo","year":"1997","unstructured":"Lo, H.\u2013K., Chau, H.F.: Is quantum Bit Commitment Really Possible? Physical Review Letters\u00a078(17), 3410\u20133413 (1997)","journal-title":"Physical Review Letters"},{"key":"21_CR12","unstructured":"Mayers, D.: The Trouble With Quantum Bit Commitment (1996), available at: \n                  \n                    http:\/\/xxx.lanl.gov\/abs\/quant-ph\/9603015"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/3-540-68697-5_26","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"D. Mayers","year":"1996","unstructured":"Mayers, D.: Quantum Key Distribution and String Oblivious Transfer in Noisy Channels. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 343\u2013357. Springer, Heidelberg (1996)"},{"issue":"17","key":"21_CR14","doi-asserted-by":"publisher","first-page":"3414","DOI":"10.1103\/PhysRevLett.78.3414","volume":"78","author":"D. Mayers","year":"1997","unstructured":"Mayers, D.: Unconditionally Secure Quantum Bit Commitment is Impossible. Physical Review Letters\u00a078(17), 3414\u20133417 (1997)","journal-title":"Physical Review Letters"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Mayers, D., Salvail, L.: Quantum Oblivious Transfer is Secure Against All Individual Measurements. In: Proceedings of the Workshop on Physics and Computationm, PhysComp 1994, Dallas, pp. 69\u201377 (1994)","DOI":"10.1109\/PHYCMP.1994.363696"},{"key":"21_CR16","unstructured":"Rabin, M.O.: How to exchange secrets by oblivious transfer, Technical Memo TR\u201381, Aiken Computation Laboratory, Harvard University (1981)"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/BFb0055740","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"L. Salvail","year":"1998","unstructured":"Salvail, L.: Quantum Bit Commitment From a Physical Assumption. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 338\u2013354. Springer, Heidelberg (1998)"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Watrous, J.: Limits on the Power of Quantum Statistical Zero-Knowledge. In: Proceedings of the 43rd Annual Symposium on Foundations of Computer Science, pp. 495\u2013504 (2002)","DOI":"10.1109\/SFCS.2002.1181970"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Theory and Applications of Trapdoor Functions. In: Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science, pp. 80\u201391 (1982)","DOI":"10.1109\/SFCS.1982.45"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Security of Quantum Protocols Against Coherent Measurements. In: Proceedings of the 27th ACM Symposium on Theory of Computing, pp. 67\u201375 (1995)","DOI":"10.1145\/225058.225085"}],"container-title":["Lecture Notes in Computer Science","Theory of Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24638-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T17:20:12Z","timestamp":1552843212000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24638-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210009","9783540246381"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24638-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}