{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:27:51Z","timestamp":1729654071462,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/itw.2006.1633774","type":"proceedings-article","created":{"date-parts":[[2006,5,25]],"date-time":"2006-05-25T16:26:01Z","timestamp":1148574361000},"page":"24-26","source":"Crossref","is-referenced-by-count":0,"title":["Oblivious Transfer and Quantum Channels"],"prefix":"10.1109","author":[{"given":"N.","family":"Gisin","sequence":"first","affiliation":[]},{"given":"S.","family":"Popescutt","sequence":"additional","affiliation":[]},{"given":"V.","family":"Scarani","sequence":"additional","affiliation":[]},{"given":"S.","family":"Wolf","sequence":"additional","affiliation":[]},{"given":"J.","family":"Wullschleger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2004","author":"wolf","journal-title":"Oblivious Transfer Is Symmetric","key":"19"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/1008908.1008920"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/ISIT.2005.1523644"},{"year":"1932","author":"von neumann","journal-title":"Mathematische Grundlagen der Quanten-mechanik","key":"15"},{"year":"1955","journal-title":"Mathematial Foundations of Quantum Mechanics","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1103\/PhysRevLett.91.187904"},{"year":"2000","author":"van dam","journal-title":"On Quantum Computation Theory","key":"14"},{"key":"11","article-title":"How to exchange secrets by oblivious transfer","author":"rabin","year":"1981","journal-title":"Technical Report TR-81 Harvard Aiken Computation Laboratory"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1007\/978-3-0348-9259-9_14"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1103\/PhysRevLett.70.1895"},{"key":"2","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1103\/PhysicsPhysiqueFizika.1.195","article-title":"On the Einstein-Podolsky-Rosen paradox","volume":"1","author":"bell","year":"1964","journal-title":"Physics"},{"year":"1998","author":"ambainis","journal-title":"Dense Quantum Coding and a Lower Bound for 1-way Quantum Automata","key":"1"},{"year":"1997","author":"popescu","journal-title":"Causality and Nonlocality As Axioms for Quantum Mechanics","key":"10"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1007\/978-94-010-1795-4_7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1103\/PhysRev.47.777"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.94.220403","article-title":"Simulating maximal quantum entanglement without communication","volume":"94","author":"cerf","year":"2005","journal-title":"Phys Rev Lett"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1103\/PhysRevLett.84.2521"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1512\/iumj.1968.17.17004"},{"key":"8","first-page":"827","article-title":"Can hidden variables be excluded in quantum mechanics?","volume":"36","author":"jauch","year":"1963","journal-title":"Helv Phys Acta"}],"event":{"name":"2006 IEEE Information Theory Workshop","location":"Punta del Este, Uruguay"},"container-title":["2006 IEEE Information Theory Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10885\/34255\/01633774.pdf?arnumber=1633774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,18]],"date-time":"2019-04-18T20:50:33Z","timestamp":1555620633000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1633774\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/itw.2006.1633774","relation":{},"subject":[]}}