{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:33:15Z","timestamp":1725672795915},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291005"},{"type":"electronic","value":"9783642291012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29101-2_9","type":"book-chapter","created":{"date-parts":[[2012,4,2]],"date-time":"2012-04-02T00:10:23Z","timestamp":1333325423000},"page":"126-143","source":"Crossref","is-referenced-by-count":0,"title":["T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settings"],"prefix":"10.1007","author":[{"given":"Christian L. F.","family":"Corniaux","sequence":"first","affiliation":[]},{"given":"Hossein","family":"Ghodosi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1007\/0-387-34805-0_48","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"M. Bellare","year":"1990","unstructured":"Bellare, M., Micali, S.: Non-interactive Oblivious Transfer and Applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 547\u2013557. Springer, Heidelberg (1990)"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/3-540-36492-7_19","volume-title":"Selected Areas in Cryptography","author":"C. Blundo","year":"2003","unstructured":"Blundo, C., D\u2019Arco, P., De Santis, A., Stinson, D.R.: New Results on Unconditionally Secure Distributed Oblivious Transfer. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 291\u2013309. Springer, Heidelberg (2003)"},{"issue":"3","key":"9_CR3","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s00145-007-0327-2","volume":"20","author":"C. Blundo","year":"2007","unstructured":"Blundo, C., D\u2019Arco, P., De Santis, A., Stinson, D.R.: On unconditionally secure distributed oblivious transfer. Journal of Cryptology\u00a020(3), 323\u2013373 (2007)","journal-title":"Journal of Cryptology"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","first-page":"234","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"G. Brassard","year":"1987","unstructured":"Brassard, G., Cr\u00e9peau, C., Robert, J.M.: All-or-Nothing Disclosure of Secrets. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 234\u2013238. Springer, Heidelberg (1987)"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-642-02620-1_26","volume-title":"Information Security and Privacy","author":"K.Y. Cheong","year":"2009","unstructured":"Cheong, K.Y., Koshiba, T., Nishiyama, S.: Strengthening the Security of Distributed Oblivious Transfer. In: Boyd, C., Gonz\u00e1lez Nieto, J. (eds.) ACISP 2009. LNCS, vol.\u00a05594, pp. 377\u2013388. Springer, Heidelberg (2009)"},{"key":"9_CR6","unstructured":"Desmedt, Y.G., Jajodia, S.: Redistributing secret shares to new access structures and its applications. Tech. rep., George Mason University (1997)"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S. Even","year":"1985","unstructured":"Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Communications of the ACM\u00a028, 637\u2013647 (1985)","journal-title":"Communications of the ACM"},{"key":"9_CR8","unstructured":"Gertner, Y., Malkin, T.: Efficient distributed (n choose 1) oblivious transfer. Tech. rep., MIT Lab of Computer Science (1997)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Jiang, S., Li, H., Li, B.: Distributed oblivious transfer with adaptive queries. In: 2010 International Conference on Communications and Mobile Computing, pp. 213\u2013217. IEEE (2010)","DOI":"10.1109\/CMC.2010.338"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1007\/3-540-48405-1_36","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"M. Naor","year":"1999","unstructured":"Naor, M., Pinkas, B.: Oblivious Transfer with Adaptive Queries. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 573\u2013590. Springer, Heidelberg (1999)"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/3-540-44448-3_16","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Naor","year":"2000","unstructured":"Naor, M., Pinkas, B.: Distributed Oblivious Transfer. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 205\u2013219. Springer, Heidelberg (2000)"},{"issue":"1","key":"9_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-004-0102-6","volume":"18","author":"M. Naor","year":"2005","unstructured":"Naor, M., Pinkas, B.: Computationally secure oblivious transfer. Journal of Cryptology\u00a018(1), 1\u201335 (2005)","journal-title":"Journal of Cryptology"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/3-540-36231-2_31","volume-title":"Progress in Cryptology - INDOCRYPT 2002","author":"V. Nikov","year":"2002","unstructured":"Nikov, V., Nikova, S., Preneel, B., Vandewalle, J.: On Unconditionally Secure Distributed Oblivious Transfer. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol.\u00a02551, pp. 395\u2013408. Springer, Heidelberg (2002)"},{"key":"9_CR14","unstructured":"Rabin, M.O.: How to exchange secrets with oblivious transfer. Tech. rep., Aiken Computation Lab, Harvard University (1981)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29101-2_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:23:43Z","timestamp":1620113023000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29101-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291005","9783642291012"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29101-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}