{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:25Z","timestamp":1725562405607},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540209966"},{"type":"electronic","value":"9783540246602"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24660-2_15","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T15:18:44Z","timestamp":1280762324000},"page":"179-193","source":"Crossref","is-referenced-by-count":0,"title":["Bit String Commitment Reductions with a Non-zero Rate"],"prefix":"10.1007","author":[{"given":"Anderson C. A.","family":"Nascimento","sequence":"first","affiliation":[]},{"given":"Joern","family":"Mueller-Quade","sequence":"additional","affiliation":[]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"15_CR1","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"C.H. Bennett","year":"1995","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Maure, U.: Generalized Privacy Amplification. IEEE Transaction on Information Theory\u00a041(6), 1915\u20131923 (1995)","journal-title":"IEEE Transaction on Information Theory"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/BFb0054139","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"C. Cachin","year":"1998","unstructured":"Cachin, C.: On the Foundations of Oblivious Transfer. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 361\u2013374. Springer, Heidelberg (1998)"},{"key":"15_CR3","first-page":"42","volume-title":"29th Symp. on Found. of Computer Sci.","author":"C. Crepeau","year":"1988","unstructured":"Crepeau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions. In: 29th Symp. on Found. of Computer Sci., pp. 42\u201352. IEEE, Los Alamitos (1988)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/3-540-69053-0_21","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"C. Cr\u00e9peau","year":"1997","unstructured":"Cr\u00e9peau, C.: Efficient Cryptographic Protocols Based on Noisy Channels. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 306\u2013317. Springer, Heidelberg (1997)"},{"key":"15_CR5","unstructured":"Crepeau, C., Dumais, P., Mayers, D., Salvail, L.: Apparent Collapse of Quantum State and Computational Quantum Oblivious Transfer, pre-print available at http:\/\/crypto.cs.mcgill.ca\/~crepeau\/PS\/subqmc-3.ps"},{"key":"15_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T. Cover","year":"1991","unstructured":"Cover, T., Thomas, J.: Elements of Information Theory. Wiley, Chichester (1991)"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/3-540-69053-0_21","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"C. Crepeau","year":"1997","unstructured":"Crepeau, C.: Efficient Cryptographic Protocols Based on Noisy Channels. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 306\u2013317. Springer, Heidelberg (1997)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/3-540-48910-X_5","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"I.B. Damg\u00e5rd","year":"1999","unstructured":"Damg\u00e5rd, I.B., Kilian, J., Salvail, L.: On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, p. 56. Springer, Heidelberg (1999)"},{"issue":"3","key":"15_CR9","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1109\/18.669255","volume":"44","author":"T.. Damgard","year":"1998","unstructured":"Damgard, T., Pedersen, B.: Pfitzmann: Statistical Secrecy and Multi-Bit Commitments. IEEE Transactions on Information Theory\u00a044(3), 1143\u20131151 (1998)","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/3-540-45539-6_21","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"P. Dumais","year":"2000","unstructured":"Dumais, P., Mayers, D., Salvail, L.: Perfectly Concealing Quantum Bit Commitment from Any Quantum One-Way Permutation. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 300\u2013315. Springer, Heidelberg (2000)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Kilian, J.: Founding Cryptography on Oblivious Transfer. In: Proceedings of the 20th ACM Symposium on the Theory of Computing (1988)","DOI":"10.1145\/62212.62215"},{"issue":"17","key":"15_CR12","doi-asserted-by":"publisher","first-page":"3410","DOI":"10.1103\/PhysRevLett.78.3410","volume":"78","author":"H.K. Lo","year":"1997","unstructured":"Lo, H.K., Chau, H.F.: Is quantum Bit Commitment Really Possible? Physical Review Letters\u00a078(17), 3410 (1997)","journal-title":"Physical Review Letters"},{"key":"15_CR13","unstructured":"Mayers, D.: The Trouble With Quantum Bit Commitment (March 1996), http:\/\/xxx.lanl.gov\/abs\/quant-ph\/9603015"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/3-540-45539-6_24","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"U. Maurer","year":"2000","unstructured":"Maurer, U., Wolf, S.: Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 351\u2013368. Springer, Heidelberg (2000)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Naor, M.: Bit Commitment Using Pseudorandomness. J. of Cryptology 4, 151\u2013158","DOI":"10.1007\/BF00196774"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Nascimento, A., Mueller-Quade, J., Imai, H.: Optimal Multi-Bit Commitment Reductions to Weak Commitments. In: ISIT 2002, p. 294 (2002)","DOI":"10.1109\/ISIT.2002.1023566"},{"key":"15_CR17","unstructured":"Rivest, R.L.: Unconditionally secure commitment and oblivious transfer schemes using concealing channels and a trusted initializer (pre-print)"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/BFb0055740","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"L. Salvail","year":"1998","unstructured":"Salvail, L.: Quantum Bit Commitment From a Physical Assumption. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 338\u2013353. Springer, Heidelberg (1998)"},{"key":"15_CR19","volume-title":"Cryptography: Theory and Practice","author":"D. Stinson","year":"1995","unstructured":"Stinson, D.: Cryptography: Theory and Practice. CRC Press, Florida (1995)"},{"key":"15_CR20","unstructured":"Wyner, A.D.: The WireTap Channel Bell System J., 54, 1355\u20131387 (1981)"},{"key":"15_CR21","unstructured":"Winter, A., Nascimento, H.: Imai, Commitment Capacity of Discrete Memoryless Channels, http:\/\/xxx.lanl.gov\/abs\/cs.CR\/0304014"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Yao, A.: Security of Quantum Protocols Against Coherent Measurements. In: Proceedings of the 26th Annual ACM Symposium on the Theory of Computing (1995)","DOI":"10.1145\/225058.225085"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24660-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:30:42Z","timestamp":1559359842000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24660-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540209966","9783540246602"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24660-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}