{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:00:36Z","timestamp":1740096036096,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642319112"},{"type":"electronic","value":"9783642319129"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31912-9_22","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T07:57:56Z","timestamp":1342252676000},"page":"332-345","source":"Crossref","is-referenced-by-count":1,"title":["Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering"],"prefix":"10.1007","author":[{"given":"Paolo","family":"Palmieri","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Pereira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Bellardo, J., Savage, S.: Measuring packet reordering. In: Internet Measurement Workshop, pp. 97\u2013105. ACM (2002)","DOI":"10.1145\/637215.637216"},{"issue":"6","key":"22_CR2","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1109\/90.811445","volume":"7","author":"J.C.R. Bennett","year":"1999","unstructured":"Bennett, J.C.R., Partridge, C., Shectman, N.: Packet reordering is not pathological network behavior. IEEE\/ACM Trans. Netw.\u00a07(6), 789\u2013798 (1999)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"2","key":"22_CR3","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1109\/TNET.2006.873366","volume":"14","author":"S. Bohacek","year":"2006","unstructured":"Bohacek, S., Hespanha, J.P., Lee, J., Lim, C., Obraczka, K.: A new tcp for persistent packet reordering. IEEE\/ACM Trans. Netw.\u00a014(2), 369\u2013382 (2006)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Chaum, D., Damg\u00e5rd, I., van de Graaf, J.: Multiparty computations ensuring privacy of each party\u2019s input and correctness of the result. In: Pomerance [17], pp. 87\u2013119","DOI":"10.1007\/3-540-48184-2_7"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau, C.: Equivalence between two flavours of oblivious transfers. In: Pomerance [17], pp. 350\u2013354","DOI":"10.1007\/3-540-48184-2_30"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions (extended abstract). In: FOCS, pp. 42\u201352. IEEE (1988)","DOI":"10.1109\/SFCS.1988.21920"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-30598-9_4","volume-title":"Security in Communication Networks","author":"C. Cr\u00e9peau","year":"2005","unstructured":"Cr\u00e9peau, C., Morozov, K., Wolf, S.: Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 47\u201359. Springer, Heidelberg (2005)"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-540-24638-1_20","volume-title":"Theory of Cryptography","author":"I. Damg\u00e5rd","year":"2004","unstructured":"Damg\u00e5rd, I., Fehr, S., Morozov, K., Salvail, L.: Unfair Noisy Channels and Oblivious Transfer. In: Naor, M. (ed.) TCC 2004. LNCS, vol.\u00a02951, pp. 355\u2013373. Springer, Heidelberg (2004)"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/3-540-48910-X_5","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"I.B. Damg\u00e5rd","year":"1999","unstructured":"Damg\u00e5rd, I.B., Kilian, J., Salvail, L.: On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 56\u201373. Springer, Heidelberg (1999)"},{"issue":"6","key":"22_CR10","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S. Even","year":"1985","unstructured":"Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM\u00a028(6), 637\u2013647 (1985)","journal-title":"Commun. ACM"},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TNET.2006.890117","volume":"15","author":"S. Jaiswal","year":"2007","unstructured":"Jaiswal, S., Iannaccone, G., Diot, C., Kurose, J., Towsley, D.: Measurement and classification of out-of-sequence packets in a tier-1 ip backbone. IEEE\/ACM Trans. Netw.\u00a015, 54\u201366 (2007), \n                    \n                      http:\/\/dx.doi.org\/10.1109\/TNET.2006.890117","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Jayasumana, A., Piratla, N., Banka, T., Bare, A., Whitner, R.: Improved packet reordering metrics. RFC 5236 (Informational) (June 2008), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc5236.txt","DOI":"10.17487\/rfc5236"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Kilian, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20\u201331. ACM (1988)","DOI":"10.1145\/62212.62215"},{"key":"22_CR14","unstructured":"Laine, J., Saaristo, S.: RUDE: Real-time UDP data emitter (1999\u20132002), \n                    \n                      http:\/\/rude.sourceforge.net\/"},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-21518-6_10","volume-title":"Information Security and Cryptology","author":"P. Palmieri","year":"2011","unstructured":"Palmieri, P., Pereira, O.: Building Oblivious Transfer on Channel Delays. In: Lai, X., Yung, M., Lin, D. (eds.) Inscrypt 2010. LNCS, vol.\u00a06584, pp. 125\u2013138. Springer, Heidelberg (2011)"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Paxson, V.E.: Measurements and Analysis of End-to-End Internet Dynamics. Ph.D. thesis, EECS Department, University of California, Berkeley (June 1997), \n                    \n                      http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/1997\/5498.html","DOI":"10.2172\/551971"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - CRYPTO \u201987","year":"1988","unstructured":"Pomerance, C. (ed.): CRYPTO 1987. LNCS, vol.\u00a0293. Springer, Heidelberg (1988)"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Postel, J.: User datagram protocol. RFC 768 (Standard) (August 1980), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc768.txt","DOI":"10.17487\/rfc0768"},{"key":"22_CR19","unstructured":"Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University (1981) (manuscript)"},{"key":"22_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-00457-5_20","volume-title":"Theory of Cryptography","author":"J. Wullschleger","year":"2009","unstructured":"Wullschleger, J.: Oblivious Transfer from Weak Noisy Channels. In: Reingold, O. (ed.) TCC 2009. LNCS, vol.\u00a05444, pp. 332\u2013349. Springer, Heidelberg (2009)"},{"key":"22_CR21","unstructured":"Ye, B., Jayasumana, A.P., Piratla, N.M.: On monitoring of end-to-end packet reordering over the internet. In: International Conference on Networking and Services (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31912-9_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:50:53Z","timestamp":1620129053000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31912-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319112","9783642319129"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31912-9_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}