{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T04:15:38Z","timestamp":1768450538097,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540223795","type":"print"},{"value":"9783540278009","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27800-9_6","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T23:00:38Z","timestamp":1283727638000},"page":"62-73","source":"Crossref","is-referenced-by-count":10,"title":["Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions"],"prefix":"10.1007","author":[{"given":"Goichiro","family":"Hanaoka","sequence":"first","affiliation":[]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[]},{"given":"Joern","family":"Mueller-Quade","sequence":"additional","affiliation":[]},{"given":"Anderson C. A.","family":"Nascimento","sequence":"additional","affiliation":[]},{"given":"Akira","family":"Otsuka","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Winter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Beaver, D.: Commodity-Based Cryptography (Extended Abstract). In: STOC 1997, pp. 446\u2013455 (1997)","DOI":"10.1145\/258533.258637"},{"issue":"1-3","key":"6_CR2","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1023\/A:1016501125022","volume":"26","author":"C. Blundo","year":"2002","unstructured":"Blundo, C., Masucci, B., Stinson, D.R., Wei, R.: Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes. Designs, Codes, and Cryptography, Special Issue in Honour of Ron Mullin\u00a026(1-3), 97\u2013110 (2002)","journal-title":"Designs, Codes, and Cryptography, Special Issue in Honour of Ron Mullin"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/3-540-44448-3_11","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"G. Hanaoka","year":"2000","unstructured":"Hanaoka, G., Shikata, J., Zheng, Y., Imai, H.: Unconditionally Secure Digital Signature Schemes Admitting Transferability. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 130\u2013142. Springer, Heidelberg (2000)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-48184-2_14","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"T. Matsumoto","year":"1988","unstructured":"Matsumoto, T., Imai, H.: On the Key Predistribution Systems: A Practical Solution to the Key Distribution Problem. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 185\u2013193. Springer, Heidelberg (1988)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: 31st STOC, pp. 245\u2013254 (1999)","DOI":"10.1145\/301250.301312"},{"key":"6_CR6","unstructured":"Rivest, R.L.: Unconditionally Secure Commitment and Oblivious Transfer Schemes Using Concealing Channels and a Trusted Initializer, Preprint available from http:\/\/theory.lcs.mit.edu\/~rivest\/Rivest-commitment.pdf"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-45682-1_22","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"Y.-C. Chang","year":"2001","unstructured":"Chang, Y.-C., Lu, C.-J.: Oblivious Polynomial Evaluation and Oblivious Neural Learning. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 369\u2013384. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27800-9_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:21:24Z","timestamp":1605759684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27800-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540223795","9783540278009"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27800-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}