{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:55:10Z","timestamp":1725494110974},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/itw.2012.6404657","type":"proceedings-article","created":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T15:30:12Z","timestamp":1358436612000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["An information-theoretic protocol compiler"],"prefix":"10.1109","author":[{"given":"Amit","family":"Sahai","sequence":"first","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1145\/1250790.1250794"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1007\/s001459910003"},{"key":"18","first-page":"145","article-title":"Extending oblivious transfers efficiently","author":"ishai","year":"2003","journal-title":"CRYPTO Volume 2729 of Lecture Notes in Computer Science"},{"key":"15","first-page":"96","article-title":"On robust combiners for oblivious transfer and other primitives","author":"harnik","year":"2005","journal-title":"EUROCRYPT Volume 3494 of Lecture Notes in Computer Science"},{"year":"1986","author":"haber","journal-title":"Personal Communication to Galil","key":"16"},{"key":"13","first-page":"73","author":"goldreich","year":"0","journal-title":"How to Solve Any Protocol Problem - An Efficiency Improvement"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1007\/978-3-540-78524-8_22"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/116825.116852"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1017\/CBO9780511721656"},{"key":"21","first-page":"448","article-title":"Efficient oblivious transfer protocols","author":"naor","year":"2001","journal-title":"SODA"},{"key":"20","first-page":"572","article-title":"Founding cryptography on oblivious transfer - Efficiently","author":"ishai","year":"2008","journal-title":"Crypto"},{"year":"1987","author":"pomerance","journal-title":"Advances in Cryptology - CRYPTO '87 a Conference on the Theory and Applications of Cryptographic Techniques","key":"22"},{"key":"23","first-page":"554","article-title":"A framework for efficient and composable oblivious transfer","author":"peikert","year":"2008","journal-title":"CRYPTO Volume 5157 of Lecture Notes in Computer Science"},{"key":"24","article-title":"How to exchange secrets by oblivious transfer","author":"rabin","year":"1981","journal-title":"Technical Report TR-81 Harvard Aiken Computation Laboratory"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1145\/73007.73014"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/62212.62213"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/SFCS.1989.63520"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/28395.28420"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/237814.237996"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1145\/3812.3818"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1007\/BF00206326"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/62212.62214"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/31846.42229"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/22145.22178"},{"key":"8","first-page":"135","author":"galil","year":"0","journal-title":"Cryptographic Computation Secure Faut-tolerant Protocols and the Public-key Model"}],"event":{"name":"2012 IEEE Information Theory Workshop (ITW 2012)","start":{"date-parts":[[2012,9,3]]},"location":"Lausanne, Switzerland","end":{"date-parts":[[2012,9,7]]}},"container-title":["2012 IEEE Information Theory Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6389798\/6404631\/06404657.pdf?arnumber=6404657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T13:47:21Z","timestamp":1490190441000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6404657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/itw.2012.6404657","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}