{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T14:42:34Z","timestamp":1758811354783,"version":"3.40.4"},"reference-count":42,"publisher":"SPIE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8,22]]},"DOI":"10.1117\/12.2063733","type":"proceedings-article","created":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T20:14:41Z","timestamp":1408738481000},"page":"92861C","source":"Crossref","is-referenced-by-count":5,"title":["A brief review on quantum bit commitment"],"prefix":"10.1117","volume":"9286","author":[{"given":"\u00c1lvaro J.","family":"Almeida","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Loura","sequence":"additional","affiliation":[]},{"given":"Nikola","family":"Paunkovi\u0107","sequence":"additional","affiliation":[]},{"given":"Nuno A.","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Nelson J.","family":"Muga","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Mateus","sequence":"additional","affiliation":[]},{"given":"Paulo S.","family":"Andr\u00e9","sequence":"additional","affiliation":[]},{"given":"Armando N.","family":"Pinto","sequence":"additional","affiliation":[]}],"member":"189","reference":[{"key":"c1","unstructured":"Crandall, R. and Pomerance, C., [Prime Numbers: A Computational Perspective], Springer, 2nd ed. (Aug. 2005)."},{"key":"c2","unstructured":"Vaudenay, S., [A Classical Introduction to Cryptography: Applications for Communications Security], Springer (2006)."},{"key":"c3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.112.010504"},{"key":"c4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.78.3414"},{"key":"c5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.78.3410"},{"key":"c6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.81.052336"},{"key":"c7","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/13\/11\/113015"},{"key":"c8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.111.180504"},{"key":"c9","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.1948.27.issue-4"},{"key":"c10","unstructured":"Data Encryption Standard (DES), \u201cFederal Information Processing Standards Publication 46\u20133. U.S. De-partment of Commerce, National Institute of Standards and Technology,\u201d (1999)."},{"key":"c11","unstructured":"Advanced Encryption Standard (AES), \u201cFederal Information Processing Standards Publication 197. U.S. Department of Commerce, National Institute of Standards and Technology,\u201d (2001)."},{"key":"c12","doi-asserted-by":"publisher","DOI":"10.1145\/1008908"},{"key":"c13","first-page":"11","article-title":"Coin \ufb02ipping by telephone","author":"Blum","year":"1981"},{"key":"c14","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(88)90005-0"},{"key":"c15","unstructured":"Bennett, C.H. and Brassad, G., \u201cQuantum cryptography: Public-key distribution and coin tossing,\u201d Pro-ceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 175\u2013179 (Dec. 1984)."},{"key":"c16","doi-asserted-by":"crossref","unstructured":"Brassard, G., Cr\u00e9peau, C., Jozsa, R., and Langlois, D., \u201cA quantum bit commitment scheme provably unbreakable by both parties,\u201d in [Foundations of Computer Science, 1993. Proceedings., 34th Annual Sym-posium on], 362\u2013371 (1993).","DOI":"10.1109\/SFCS.1993.366851"},{"key":"c17","unstructured":"Cr\u00e9peau, C., [What is going on with Quantum Bit Commitment?], Czech Technical University Publishing House (1996)."},{"key":"c18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.83.1447"},{"key":"c19","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.109.130501"},{"key":"c20","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-011-0284-4"},{"key":"c21","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.68.1"},{"key":"c22","doi-asserted-by":"publisher","DOI":"10.1038\/nphys1710"},{"key":"c23","doi-asserted-by":"publisher","DOI":"10.1126\/science.1220513"},{"key":"c24","doi-asserted-by":"publisher","DOI":"10.1126\/science.1239584"},{"key":"c25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.89.052336"},{"article-title":"Implementation of a Two-State Quantum Bit Commitment Protocol in Optical Fibers","year":"2014","author":"Almeida","key":"c26"},{"key":"c27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7"},{"key":"c28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.040501"},{"article-title":"Modern cryptology: A tutorial","year":"1998","author":"Brassard","key":"c29"},{"key":"c30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78524-8"},{"key":"c31","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-013-0550-8"},{"key":"c32","first-page":"5","article-title":"An experimental implementation of oblivious transfer in the noisy storage model","author":"Erven","year":"2014"},{"key":"c33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4"},{"article-title":"Information-theoretically secure voting without an honest majority","year":"2008","author":"Broadbent","key":"c34"},{"key":"c35","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.100.220502"},{"key":"c36","first-page":"963","article-title":"Robust cryptography in the noisy-quantum-storage model","volume":"9","author":"Schaffner","year":"2009"},{"key":"c37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2177772"},{"key":"c38","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms2268"},{"key":"c39","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.92.157901"},{"key":"c40","doi-asserted-by":"publisher","DOI":"10.1088\/0264-9381\/29\/22\/224013"},{"key":"c41","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.90.237901"},{"key":"c42","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2004.834481"}],"event":{"name":"Second International Conference on Applications of Optics and Photonics","location":"Aveiro, Portugal"},"container-title":["SPIE Proceedings","Second International Conference on Applications of Optics and Photonics"],"original-title":[],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T09:37:38Z","timestamp":1746351458000},"score":1,"resource":{"primary":{"URL":"http:\/\/proceedings.spiedigitallibrary.org\/proceeding.aspx?doi=10.1117\/12.2063733"}},"subtitle":[],"editor":[{"given":"Manuel Filipe P. C.","family":"Martins Costa","sequence":"first","affiliation":[]},{"given":"Rog\u00e9rio Nunes","family":"Nogueira","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2014,8,22]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1117\/12.2063733","relation":{},"ISSN":["0277-786X"],"issn-type":[{"type":"print","value":"0277-786X"}],"subject":[],"published":{"date-parts":[[2014,8,22]]}}}