{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:35:22Z","timestamp":1772908522481,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540768999","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76900-2_28","type":"book-chapter","created":{"date-parts":[[2007,11,5]],"date-time":"2007-11-05T01:38:44Z","timestamp":1194226724000},"page":"460-473","source":"Crossref","is-referenced-by-count":30,"title":["Anonymous Quantum Communication"],"prefix":"10.1007","author":[{"given":"Gilles","family":"Brassard","sequence":"first","affiliation":[]},{"given":"Anne","family":"Broadbent","sequence":"additional","affiliation":[]},{"given":"Joseph","family":"Fitzsimons","sequence":"additional","affiliation":[]},{"given":"S\u00e9bastien","family":"Gambs","sequence":"additional","affiliation":[]},{"given":"Alain","family":"Tapp","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"C.H. Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Physical Review Letters\u00a070, 1895\u20131899 (1993)","journal-title":"Physical Review Letters"},{"key":"28_CR2","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/SFCS.2002.1181969","volume-title":"Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS 2002)","author":"H. Barnum","year":"2002","unstructured":"Barnum, H., Cr\u00e9peau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS 2002), p. 449. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"28_CR3","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1109\/FOCS.2006.68","volume-title":"Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2006)","author":"M. Ben-Or","year":"2006","unstructured":"Ben-Or, M., Cr\u00e9peau, C., Gottesman, D., Hassidim, A., Smith, A.: Secure multiparty quantum computation with (only) a strict honest majority. In: Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2006), pp. 249\u2013260. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"28_CR4","unstructured":"Boyan, J.: The Anonymizer: protecting user privacy on the Web. Computer-Mediated Communication Magazine\u00a04(9) (1997)"},{"key":"28_CR5","unstructured":"Boykin, P.O.: Information security and quantum mechanics: security of quantum protocols. PhD thesis, University of California, Los Angeles (2002)"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Bouda, J., \u0160projcar, J.: Anonymous transmission of quantum information. In: Proceedings of the First International Conference on Quantum, Nano, and Micro Technologies (ICQNM 2007) (2007)","DOI":"10.1109\/ICQNM.2007.2"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/978-3-540-76900-2_25","volume-title":"ASIACRYPT 2007","author":"A. Broadbent","year":"2007","unstructured":"Broadbent, A., Tapp, A.: Information-theoretic security without an honest majority. In: ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 410\u2013426. Springer, Heidelberg (2007)"},{"key":"28_CR8","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a024, 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology\u00a01, 65\u201375 (1988)","journal-title":"Journal of Cryptology"},{"key":"28_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/11593447_12","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"M. Christandl","year":"2005","unstructured":"Christandl, M., Wehner, S.: Quantum anonymous transmissions. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 217\u2013235. Springer, Heidelberg (2005)"},{"issue":"2","key":"28_CR11","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/293411.293447","volume":"42","author":"E. Gabber","year":"1999","unstructured":"Gabber, E., Gibbons, P.B., Kristol, D.M., Matias, Y., Mayer, A.J.: Consistent, yet anonymous, Web access with\u00a0LPWA. Communications of the ACM\u00a042(2), 42\u201347 (1999)","journal-title":"Communications of the ACM"},{"key":"28_CR12","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"The Foundations of Cryptography","author":"O. Goldreich","year":"2004","unstructured":"Goldreich, O.: The Foundations of Cryptography, vol.\u00a02. Cambridge University Press, Cambridge (2004)"},{"key":"28_CR13","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/73007.73014","volume-title":"Proceedings of the twenty-first annual ACM Symposium on Theory of Computing (STOC)","author":"T. Rabin","year":"1989","unstructured":"Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the twenty-first annual ACM Symposium on Theory of Computing (STOC), pp. 73\u201385. ACM Press, New York (1989)"},{"key":"28_CR14","unstructured":"Wehner, S.: Quantum computation and privacy. Master\u2019s thesis, CWI Amsterdam (2004)"},{"key":"28_CR15","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"W.K. Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature\u00a0299, 802\u2013803 (1982)","journal-title":"Nature"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76900-2_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:46:02Z","timestamp":1619520362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76900-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540768999"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76900-2_28","relation":{},"subject":[]}}