{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T06:01:08Z","timestamp":1718258468155},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2003,12,1]],"date-time":"2003-12-01T00:00:00Z","timestamp":1070236800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["New Gener Comput"],"published-print":{"date-parts":[[2003,12]]},"DOI":"10.1007\/bf03037308","type":"journal-article","created":{"date-parts":[[2009,4,23]],"date-time":"2009-04-23T22:52:36Z","timestamp":1240527156000},"page":"339-345","source":"Crossref","is-referenced-by-count":3,"title":["Quantum Bit-commitment for small storage based on quantum one-way permutations"],"prefix":"10.1007","volume":"21","author":[{"given":"Keisuke","family":"Tanaka","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"BF03037308_CR1","doi-asserted-by":"crossref","unstructured":"Bennett, C. H. and Brassard, G., \u201cAn Update on Quantum Cryptography,\u201dAdvances in Cryptology, inProc. of CRYPTO 84, 19\u201322 Aug., 1984, (Blakley, G. R. and Chaum, D. eds.),Lecture Notes in Computer Science, 196, Springer-Verlag, 1985, pp. 475\u2013480.","DOI":"10.1007\/3-540-39568-7_39"},{"key":"BF03037308_CR2","doi-asserted-by":"crossref","unstructured":"Buhrman, H., Cleve, R., Watrous, J. and de Wolf, R., \u201cQuantum Fingerprinting,\u201dPhysical Review Letters,87,16, 2001.","DOI":"10.1103\/PhysRevLett.87.167902"},{"key":"BF03037308_CR3","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau, C., L\u00e9gar\u00e9, F. and Salvail, L., \u201cHow to Convert the Flavor of a Quantum Bit Commitment,\u201d inAdvances in Cryptology\u2014EUROCRYPT2001, pp. 60\u201377, 2001.","DOI":"10.1007\/3-540-44987-6_5"},{"key":"BF03037308_CR4","doi-asserted-by":"crossref","unstructured":"Dumais, P., Mayers, D. and Salvail, L., \u201cPerfectly Concealing Quantum Bit Commitment from Any Quantum One-way Permutation,\u201d inAdvances in Cryptology\u2014EUROCRYPT2000, pp. 300\u2013315, 2000.","DOI":"10.1007\/3-540-45539-6_21"},{"key":"BF03037308_CR5","doi-asserted-by":"crossref","first-page":"652","DOI":"10.1109\/TIT.1972.1054893","volume":"18","author":"J. Justesen","year":"1972","unstructured":"Justesen, J., \u201cA Class of Constructive Asymptotically Good Algebraic Codes,\u201dIEEE Transactions on Information Theory 18, pp. 652\u2013656, 1972.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"17","key":"BF03037308_CR6","doi-asserted-by":"crossref","first-page":"3414","DOI":"10.1103\/PhysRevLett.78.3414","volume":"78","author":"D. Mayers","year":"1997","unstructured":"Mayers, D., \u201cUnconditionally Secure Quantum Bit Commitment is Impossible,\u201dPhysical Review Letters, 78, 17, pp. 3414\u20133417, 1997.","journal-title":"Physical Review Letters"},{"issue":"2","key":"BF03037308_CR7","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/s001459900037","volume":"11","author":"M. Naor","year":"1998","unstructured":"Naor, M., Ostrovsky, R., Ventkatesan, R. and Young, M., \u201cPerfect Zeroknowledge Arguments for NP Using Any One-way Permutation,\u201dJournal of Cryptology, 11, 2, pp. 78\u2013108, 1998.","journal-title":"Journal of Cryptology"},{"key":"BF03037308_CR8","doi-asserted-by":"crossref","unstructured":"Okamoto, T., Tanaka, K. and Uchiyama, S., \u201cQuantum Public-key Cryptosystems,\u201d inAdvances in Cryptology\u2014CRYPTO2000, pp. 147\u2013165, 2000.","DOI":"10.1007\/3-540-44598-6_9"},{"key":"BF03037308_CR9","unstructured":"Schneier, B.,Applied Cryptography\u20142nd Ed., Wiley, 1996."},{"key":"BF03037308_CR10","doi-asserted-by":"crossref","unstructured":"Watrous, J., \u201cSuccinct Quantum Proofs for Properties of Finite N Groups,\u201d inProc. of 41st Annual Symposium on Foundations of Computer Science, pp. 12\u201314, November, pp. 537\u2013546, 2000.","DOI":"10.1109\/SFCS.2000.892141"}],"container-title":["New Generation Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03037308.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF03037308\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03037308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T20:52:34Z","timestamp":1558558354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF03037308"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,12]]},"references-count":10,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2003,12]]}},"alternative-id":["BF03037308"],"URL":"https:\/\/doi.org\/10.1007\/bf03037308","relation":{},"ISSN":["0288-3635","1882-7055"],"issn-type":[{"value":"0288-3635","type":"print"},{"value":"1882-7055","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003,12]]}}}