{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T08:04:42Z","timestamp":1768550682768,"version":"3.49.0"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T00:00:00Z","timestamp":1474243200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s11128-016-1438-1","type":"journal-article","created":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T15:20:42Z","timestamp":1474298442000},"page":"5037-5050","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Quantum Oblivious Transfer: a secure practical implementation"],"prefix":"10.1007","volume":"15","author":[{"given":"Marius","family":"Nagy","sequence":"first","affiliation":[]},{"given":"Naya","family":"Nagy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,19]]},"reference":[{"key":"1438_CR1","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau, C.: Equivalence between two flavours of oblivious transfer. In: Advances in Cryptology\u2014Proceedings of CRYPTO \u201987. pp. 350\u2013354. LNCS, Springer (1988)","DOI":"10.1007\/3-540-48184-2_30"},{"key":"1438_CR2","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions. In: Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science. pp. 42\u201352. IEEE press (1988)","DOI":"10.1109\/SFCS.1988.21920"},{"key":"1438_CR3","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I.B., Fehr, S., Salvail, L., Schaffner, C.: Cryptography in the bounded quantum-storage model. In: 46th Annual IEEE Symposium on foundations of Computer Science (FOCS). pp. 449\u2013458. IEEE Computer Society (2005)","DOI":"10.1109\/SFCS.2005.30"},{"issue":"6","key":"1438_CR4","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S Even","year":"1985","unstructured":"Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637\u2013647 (1985)","journal-title":"Commun. ACM"},{"key":"1438_CR5","doi-asserted-by":"crossref","unstructured":"Kilian, J.: Founding crytpography on oblivious transfer. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing. pp. 20\u201331. STOC \u201988, ACM, New York, NY, USA, http:\/\/doi.acm.org\/10.1145\/62212.62215 (1988)","DOI":"10.1145\/62212.62215"},{"key":"1438_CR6","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s11128-013-0550-8","volume":"13","author":"YB Li","year":"2014","unstructured":"Li, Y.B., Wen, Q.Y., Qin, S.J., Guo, F.Z., Sun, Y.: Practical quantum all-or-nothing oblivious transfer protocol. Quantum Inf. Process. 13, 131\u2013139 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1438_CR7","doi-asserted-by":"crossref","first-page":"3414","DOI":"10.1103\/PhysRevLett.78.3414","volume":"78","author":"D Mayers","year":"1997","unstructured":"Mayers, D.: Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett. 78, 3414\u20133417 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"1438_CR8","doi-asserted-by":"crossref","unstructured":"Mayers, D., Salvail, L.: Quantum oblivious transfer is secure against all individual measurements. In: Proceedings of the Third Workshop on Physics and Computation \u2013 PhysComp \u201994. pp. 69\u201377. IEEE Computer Society Press, Dallas (1994)","DOI":"10.1109\/PHYCMP.1994.363696"},{"key":"1438_CR9","unstructured":"Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University (1981)"},{"key":"1438_CR10","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/1008908.1008920","volume":"15","author":"S Wiesner","year":"1983","unstructured":"Wiesner, S.: Conjugate coding. SIGACT News 15, 78\u201388 (1983)","journal-title":"SIGACT News"},{"key":"1438_CR11","unstructured":"Yang, L.: Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding. e-print arXiv:1306.5863v5 (2015)"},{"key":"1438_CR12","doi-asserted-by":"crossref","unstructured":"Yao, A.C.C.: Security of quantum protocols against coherent measurements. In: Proceedings of 26th Annual ACM Symposium on the Theory of Computing. pp. 67\u201375 (1995)","DOI":"10.1145\/225058.225085"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-016-1438-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-016-1438-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-016-1438-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T15:20:19Z","timestamp":1568388019000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-016-1438-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,19]]},"references-count":12,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["1438"],"URL":"https:\/\/doi.org\/10.1007\/s11128-016-1438-1","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,19]]}}}