{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:46:32Z","timestamp":1740098792084,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T00:00:00Z","timestamp":1483574400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["15K00186"],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1,5]]},"DOI":"10.1145\/3022227.3022327","type":"proceedings-article","created":{"date-parts":[[2017,2,10]],"date-time":"2017-02-10T13:39:43Z","timestamp":1486733983000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["On unconditionally binding code-based commitment schemes"],"prefix":"10.1145","author":[{"given":"Kirill","family":"Morozov","sequence":"first","affiliation":[{"name":"School of Computing, Tokyo"}]},{"given":"Partha Sarathi","family":"Roy","sequence":"additional","affiliation":[{"name":"Kyushu University"}]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[{"name":"Kyushu University"}]}],"member":"320","published-online":{"date-parts":[[2017,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Z. Bing T. Xueming C Hsu: A framework for fully-simulatable h-out-of-n oblivious transfer. https:\/\/arxiv.org\/abs\/1005.0043 (2010). Z. Bing T. Xueming C Hsu: A framework for fully-simulatable h-out-of-n oblivious transfer. https:\/\/arxiv.org\/abs\/1005.0043 (2010)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Bernardo M. David Anderson C. A. Nascimento Rafael T. de Sousa Jr.: Efficient Fully Simulatable Oblivious Transfer from the McEliece Assumptions. IEICE Transactions 95-A(11) pp. 2059--2066 (2012). Bernardo M. David Anderson C. A. Nascimento Rafael T. de Sousa Jr.: Efficient Fully Simulatable Oblivious Transfer from the McEliece Assumptions. IEICE Transactions 95-A(11) pp. 2059--2066 (2012).","DOI":"10.1587\/transfun.E95.A.2059"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1515\/JMC.2007.009"},{"key":"e_1_3_2_1_4_1","first-page":"245","volume-title":"EUROCRYPT 1996","author":"Fischer J. B.","year":"1996"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/519078"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_40"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2145950"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-008-9175-9"},{"key":"e_1_3_2_1_9_1","unstructured":"Request for Comments on Post-Quantum Cryptography Requirements and Evaluation Criteria: A Notice by the National Institute of Standards and Technology on 08\/02\/2016. Available online: https:\/\/www.federalregister.gov\/documents\/2016\/08\/02\/2016-18150\/request-for-comments-on-post-quantum-cryptography-requirements-and-evaluation-criteria Request for Comments on Post-Quantum Cryptography Requirements and Evaluation Criteria: A Notice by the National Institute of Standards and Technology on 08\/02\/2016. Available online: https:\/\/www.federalregister.gov\/documents\/2016\/08\/02\/2016-18150\/request-for-comments-on-post-quantum-cryptography-requirements-and-evaluation-criteria"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1054053"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1137784"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02937-5_4"}],"event":{"name":"IMCOM '17: The 11th International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Beppu Japan","acronym":"IMCOM '17"},"container-title":["Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3022227.3022327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T03:59:10Z","timestamp":1673495950000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3022227.3022327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,5]]},"references-count":12,"alternative-id":["10.1145\/3022227.3022327","10.1145\/3022227"],"URL":"https:\/\/doi.org\/10.1145\/3022227.3022327","relation":{},"subject":[],"published":{"date-parts":[[2017,1,5]]},"assertion":[{"value":"2017-01-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}