{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1362825895813430528.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1109/sfcs.2000.892121"}},{"identifier":{"@type":"URI","@value":"http://xplorestaging.ieee.org/ielx5/7164/19278/00892121.pdf?arnumber=892121"}}],"dc:title":[{"@value":"The relationship between public key encryption and oblivious transfer"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1382825895813430529","@type":"Researcher","foaf:name":[{"@value":"Y. Gertner"}]},{"@id":"https://cir.nii.ac.jp/crid/1382825895813430530","@type":"Researcher","foaf:name":[{"@value":"S. Kannan"}]},{"@id":"https://cir.nii.ac.jp/crid/1382825895813430531","@type":"Researcher","foaf:name":[{"@value":"T. Malkin"}]},{"@id":"https://cir.nii.ac.jp/crid/1382825895813430532","@type":"Researcher","foaf:name":[{"@value":"O. Reingold"}]},{"@id":"https://cir.nii.ac.jp/crid/1382825895813430528","@type":"Researcher","foaf:name":[{"@value":"M. Viswanathan"}]}],"publication":{"prism:publicationName":[{"@value":"Proceedings 41st Annual Symposium on Foundations of Computer Science"}],"dc:publisher":[{"@value":"IEEE Comput. Soc"}],"prism:startingPage":"325","prism:endingPage":"335"},"reviewed":"false","url":[{"@id":"http://xplorestaging.ieee.org/ielx5/7164/19278/00892121.pdf?arnumber=892121"}],"createdAt":"2002-11-07","modifiedAt":"2017-06-15","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1360002214929620864","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Weak Oblivious Transfer from Strong One-Way Functions"}]},{"@id":"https://cir.nii.ac.jp/crid/1360004230685768832","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups"}]},{"@id":"https://cir.nii.ac.jp/crid/1360302866861647616","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"On the Black-Box impossibility of multi-designated verifiers signature schemes from ring signature schemes"}]},{"@id":"https://cir.nii.ac.jp/crid/1360565168048562688","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Converses For Secret Key Agreement and Secure Computing"}]},{"@id":"https://cir.nii.ac.jp/crid/1360588380581377920","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions"}]},{"@id":"https://cir.nii.ac.jp/crid/1390282681288435072","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Oblivious Transfer Based on the McEliece Assumptions"}]},{"@id":"https://cir.nii.ac.jp/crid/1390588910413392512","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"On the Implications from Updatable Encryption to Public-Key Cryptographic Primitives"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1109/sfcs.2000.892121"},{"@type":"CROSSREF","@value":"10.1007/978-3-642-24316-5_5_references_DOI_DlxgrXCJwCX5XGl94U5WRpC6WrV"},{"@type":"CROSSREF","@value":"10.1109/tit.2015.2457926_references_DOI_DlxgrXCJwCX5XGl94U5WRpC6WrV"},{"@type":"CROSSREF","@value":"10.1515/jmc-2023-0028_references_DOI_DlxgrXCJwCX5XGl94U5WRpC6WrV"},{"@type":"CROSSREF","@value":"10.1587/transfun.e95.a.567_references_DOI_DlxgrXCJwCX5XGl94U5WRpC6WrV"},{"@type":"CROSSREF","@value":"10.1587/transfun.2025cip0019_references_DOI_DlxgrXCJwCX5XGl94U5WRpC6WrV"},{"@type":"CROSSREF","@value":"10.1007/978-3-031-68394-7_4_references_DOI_DlxgrXCJwCX5XGl94U5WRpC6WrV"},{"@type":"CROSSREF","@value":"10.1007/978-3-642-32009-5_47_references_DOI_DlxgrXCJwCX5XGl94U5WRpC6WrV"}]}