{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T04:13:59Z","timestamp":1772165639905,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540648925","type":"print"},{"value":"9783540684626","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055740","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T21:12:36Z","timestamp":1154034756000},"page":"338-353","source":"Crossref","is-referenced-by-count":20,"title":["Quantum bit commitment from a physical assumption"],"prefix":"10.1007","author":[{"given":"Louis","family":"Salvail","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"issue":"no.2","key":"25_CR1","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1103\/PhysRevLett.49.91","volume":"49","author":"A Aspect","year":"1982","unstructured":"Aspect, A, P. Grangibr and G. Roger, \u201cExperimental realization of the Einstein-Podolsky-Rosen-Bohm gedankenexperiment: A new violation of Bell's inequalities\u201d, Physical Review Letters, vol. 49, no. 2, 1982, pp. 91\u201394.","journal-title":"Physical Review Letters"},{"issue":"no.1","key":"25_CR2","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1103\/PhysicsPhysiqueFizika.1.195","volume":"1","author":"J.S. Bell","year":"1964","unstructured":"Bell, J.S., \u201cOn the Einstein Podolsky Rosen Paradox\u201d, Physics, vol. 1, no. 1, 1964, p. 195.","journal-title":"Physics"},{"key":"25_CR3","unstructured":"Bennett, C.H. and G. Brassard, \u201cQuantum cryptography: Public key distribution and coin tossing\u201d, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175\u2013179."},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"C.H. Bennett","year":"1995","unstructured":"Bennett, C.H., G. Brassard, C. Cr\u00e9peau and U. Maurer, \u201cGeneralized Privacy Amplification\u201d, IEEE Transaction on Information Theory, vol. 41, 1995, pp. 1915\u20131923.","journal-title":"IEEE Transaction on Information Theory"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Bennett, C.H., G. Brassard, C. Cr\u00e9peau and M.-H. Skubiszewska, \u201cPractical quantum oblivious transfer\u201d, Advances in Cryptology \u2014 Proceedings of Crypto '91, August 1991, Springer-Verlag, pp. 351\u2013366.","DOI":"10.1007\/3-540-46766-1_29"},{"issue":"no.13","key":"25_CR6","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"C.H. Bennett","year":"1993","unstructured":"Bennett, C.H., G. Brassard, C. Cr\u00e9peau, R. Jozsa, A. Peres and W.K. Wootters, \u201cTeleporting an Unknown Quantum State via Dual Classical and EPR Channels\u201d, Physical Review Letters, vol.70, no. 13, 1993, pp. 1895\u20131899.","journal-title":"Physical Review Letters"},{"key":"25_CR7","unstructured":"Biham, E, G. Brassard, M. Boyer, J. van de Graaf and T. Mor, \u201cSecurity of Quantum Key Distribution Against All Collective Attacks\u201d, Los Alamos preprint archive quant-ph\/9801022, January 1998."},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1038\/37539","volume":"390","author":"D Bouwmeester","year":"1997","unstructured":"Bouwmeester, D, J.W. Pan, K. Mattle, M. Eibl, H. Weinfurter and A. Zeilinger, \u201cExperimental Quantum Teleportation\u201d, Nature, vol.390, 1997, p.575.","journal-title":"Nature"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Brassard, G. and C. Cr\u00e9peau, \u201cQuantum bit commitment and coin tossing protocols\u201d, Advances in Cryptology \u2014 Proceedings of Crypto '90, August 1990, Springer-Verlag, pp. 49\u201361.","DOI":"10.1007\/3-540-38424-3_4"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Brassard, G., C. Cr\u00e9peau, R. Jozsa and D. Langlois, \u201cA quantum bit commitment scheme provably unbreakable by both parties\u201d, Proceedings of 34th Annual IEEE Symposium on the Foundations of Computer Science, November 1993, pp. 362\u2013371.","DOI":"10.1109\/SFCS.1993.366851"},{"key":"25_CR11","unstructured":"Brassard, G., C. Cr\u00e9peau, D. Mayers and L. Salvail, \u201cA Brief Review on the Impossibility of Quantum Bit Commitment\u201d, Los Alamos preprint archive quant-ph\/9712023, December 1997."},{"issue":"no.2","key":"25_CR12","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s001459900023","volume":"10","author":"C. Cachin","year":"1997","unstructured":"Cachin, C. and U. Maurer, \u201cLinking Information Reconciliation and Privacy Amplification\u201d, Journal of Cryptology, vol. 10, no. 2, 1997, pp. 97\u2013110.","journal-title":"Journal of Cryptology"},{"key":"25_CR13","unstructured":"Cr\u00e9peau, C, \u201cWhat is going on with quantum bit commitment?\u201d, Proceedings of Pragocrypt '96: 1st International Conference on the Theory and Applications of Cryptology, Prague, October 1996."},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau, C. and L. Salvail, \u201cQuantum oblivious mutual identification\u201d, Advances in Cryptology \u2014 Proceedings of Eurocrypt '95, May 1995, Springer-Verlag, pp. 133\u2013146.","DOI":"10.1007\/3-540-49264-X_11"},{"key":"25_CR15","first-page":"110","volume-title":"Committed Oblivious Transfer and Private Multi-Party Computation","author":"C Cr\u00e9peau","year":"1995","unstructured":"Cr\u00e9peau, C, J. van de Graaf and A. Tapp, \u201cCommitted Oblivious Transfer and Private Multi-Party Computation\u201d, in Advances in Cryptology: Proceedings of Crypto '95 (Springer-Verlag, Berlin, 1995), Vol. 963, pp. 110\u2013123."},{"key":"25_CR16","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1103\/PhysRev.47.777","volume":"no. 47","author":"A. Einstein","year":"1935","unstructured":"Einstein A., B. Podolski and N. Rosen, \u201cCan Quantum-Mechanical Description of Physical Reality be Considered Complete?\u201d, Physical Review, no. 47, 1935, pp. 777\u2013780.","journal-title":"Physical Review"},{"key":"25_CR17","unstructured":"Hughes, R.J., D.F.V. James, J.J. Gomez, M.S. Gulley, M.H. Holzscheites, P.G. Kwiat, S.K. Lamoreaux, C.G. Peterson, V.D. Sandberg, M.M. Schauer, C.M. Simmons, C.E. Thorburn, D. Tupa, P.Z. Wang and A.G. White, \u201cThe Los Alamos Trapped Ion Quantum Computer Experiment\u201d, Los Alamos preprint archive quant-ph\/9708050, August 1997."},{"key":"25_CR18","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/0375-9601(93)90880-9","volume":"183","author":"L. P. Hughston","year":"1993","unstructured":"Hughston, L. P., R. Jozsa, and W.K. Wootters, \u201cA complete classification of quantum ensembles having a given density matrix\u201d, Physics Letters A, vol. 183, 1993, pp. 14\u201318.","journal-title":"Physics Letters A"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Impagliazzo, R. and M. Luby, \u201cOne-way Functions are Essential for Complexity Based Cryptography\u201d, Proceedings of 21th Annual IEEE Symposium on the Foundations of Computer Science, 1989, pp. 230\u2013235.","DOI":"10.1109\/SFCS.1989.63483"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Kilian, J., Founding Cryptography on Oblivious Transfer, in the proceeding of 20th Symposium on Theory of Computation, Chicago, 1988, pp. 20\u201331.","DOI":"10.1145\/62212.62215"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Kranakis, E., \u201cPrimality and Cryptography\u201d, John Wiley and Sons, 1986.","DOI":"10.1007\/978-3-322-96647-6"},{"key":"25_CR22","unstructured":"Lo, H.-K. and H.F. Chau, \u201cIs quantum bit commitment really possible?\u201d, preprint archive http:\/\/xxx.lanl.gov\/ps\/quant-ph\/9603004, March 1996."},{"key":"25_CR23","unstructured":"MacWilliams, F.J. and N.J.A. Sloane, \u201cThe Theory of Error-Correcting Codes\u201d, North-Holland, 1977."},{"key":"25_CR24","doi-asserted-by":"publisher","first-page":"4656","DOI":"10.1103\/PhysRevLett.76.4656","volume":"76","author":"K. Mattle","year":"1996","unstructured":"Mattle, K., H. Weinfurter, P.G. Kwiat and A. Zeilinger, \u201cDense coding in experimental quantum communication\u201d, Physical Review Letters, vol. 76, 1996, pp. 4656\u20134659.","journal-title":"Physical Review Letters"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Mayers, D., On the security of the quantum oblivious transfer and key distribution protocols, Advances in Cryptology: Proceeding of Crypto '95, Lecture Notes in Computer Science, 1995.","DOI":"10.1007\/3-540-44750-4_10"},{"key":"25_CR26","unstructured":"Mayers, D., \u201cThe trouble with quantum bit commitment\u201d, Presented at a workshop on quantum information theory, Montr\u00e9al, October 1995. Available at http:\/\/xxx.lanl.gov\/ps\/quant-ph\/9603015, March 1996."},{"key":"25_CR27","unstructured":"Mayers, D., \u201cLa s\u00e9curit\u00e9 des protocoles de la cryptographie quantique\u201d, PhD dissertation, Universit\u00e9 de Montr\u00e9al, 1996."},{"key":"25_CR28","unstructured":"Mayers, D., \u201cUnconditionally secure quantum bit commitment is impossible\u201d, presented in the Fourth Workshop on Physics and Computation \u2014 PhysComp '96, Boston, November 1996."},{"key":"25_CR29","doi-asserted-by":"publisher","first-page":"3414","DOI":"10.1103\/PhysRevLett.78.3414","volume":"78","author":"D. Mayers","year":"1997","unstructured":"Mayers, D., \u201cUnconditionally secure quantum bit commitment is impossible\u201d, Physical Review Letters, vol 78, 1997, pp. 3414\u20133417.","journal-title":"Physical Review Letters"},{"key":"25_CR30","first-page":"69","volume-title":"Quantum oblivious transfer is secure against all individual measurements","author":"D. Mayers","year":"1994","unstructured":"Mayers, D. and L. Salvail, \u201cQuantum oblivious transfer is secure against all individual measurements\u201d, Proceedings of the Third Workshop on Physics and Computation \u2014 PhysComp '94, Dallas, November 1994, IEEE Computer Society Press, pp. 69\u201377."},{"key":"25_CR31","first-page":"1209","volume":"53","author":"M. Michler","year":"1996","unstructured":"Michler, M., K. Mattle, H. Weinfurter and A. Zeilinger, \u201cInterferometric Bell-state analysis\u201d, Physical Review Letters, vol. 53, 1996, pp. 1209\u20131212.","journal-title":"Physical Review Letters"},{"key":"25_CR32","unstructured":"Rabin, M. O., \u201cHow to exchange secrets by oblivious transfer\u201d, Technical Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981."},{"key":"25_CR33","doi-asserted-by":"crossref","unstructured":"Schumacher, B., \u201dSending quantum entanglement through noisy channels\u201d, Los Alamos preprint archive http:\/\/xxx.lanl.gov\/ps\/quant-ph\/9604023, April 1996.","DOI":"10.1103\/PhysRevA.54.2614"},{"issue":"no.1","key":"25_CR34","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1008908.1008920","volume":"15","author":"S. Wiesner","year":"1983","unstructured":"Wiesner, S., \u201cConjugate coding\u201d, Sigact News, Vol. 15, no. 1, 1983, pp. 78\u201388; original manuscript written circa 1969.","journal-title":"Sigact News"},{"key":"25_CR35","doi-asserted-by":"crossref","unstructured":"Yao, A. C.-C, \u201cSecurity of quantum protocols against coherent measurements\u201d, Proceedings of 26th Annual ACM Symposium on the Theory of Computing, 1995, pp. 67\u201375.","DOI":"10.1145\/225058.225085"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T07:23:06Z","timestamp":1683530586000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055740"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648925","9783540684626"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/bfb0055740","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]}}}