{"id":"https://openalex.org/W2031880761","doi":"https://doi.org/10.1109/isit.2014.6875108","title":"Oblivious transfer in the bounded storage model with errors","display_name":"Oblivious transfer in the bounded storage model with errors","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2031880761","doi":"https://doi.org/10.1109/isit.2014.6875108","mag":"2031880761"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2014.6875108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6875108","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014034048","display_name":"Rafael Dowsley","orcid":"https://orcid.org/0000-0002-7588-2410"},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Rafael Dowsley","raw_affiliation_strings":["Institute of Theoretical Informatics, Karlsruhe Institute of Technology, Karlsruhe, Germany","[Inst. of Theor. Inf., Karlsruhe Inst. of Technol., Karlsruhe, Germany]"],"affiliations":[{"raw_affiliation_string":"Institute of Theoretical Informatics, Karlsruhe Institute of Technology, Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]},{"raw_affiliation_string":"[Inst. of Theor. Inf., Karlsruhe Inst. of Technol., Karlsruhe, Germany]","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053648095","display_name":"Felipe Lacerda","orcid":"https://orcid.org/0009-0004-0922-1376"},"institutions":[{"id":"https://openalex.org/I150729083","display_name":"Universidade de Bras\u00edlia","ror":"https://ror.org/02xfp8v59","country_code":"BR","type":"education","lineage":["https://openalex.org/I150729083"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Felipe Lacerda","raw_affiliation_strings":["Department of Computer Science, University of Brasilia, Brasilia, Brazil","[Dept. of Computer Science, University of Bras\u00edlia, Bras\u00edlia, Brazil]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Brasilia, Brasilia, Brazil","institution_ids":["https://openalex.org/I150729083"]},{"raw_affiliation_string":"[Dept. of Computer Science, University of Bras\u00edlia, Bras\u00edlia, Brazil]","institution_ids":["https://openalex.org/I150729083"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070505291","display_name":"Anderson C. A. Nascimento","orcid":"https://orcid.org/0000-0002-8298-6250"},"institutions":[{"id":"https://openalex.org/I150729083","display_name":"Universidade de Bras\u00edlia","ror":"https://ror.org/02xfp8v59","country_code":"BR","type":"education","lineage":["https://openalex.org/I150729083"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Anderson C. A. Nascimento","raw_affiliation_strings":["Department of Electrical Engineering, University of Brasilia, Brasilia, Brazil","Dept. of Electr. Eng., Univ. of Brasilia, Brasilia, Brazil#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of Brasilia, Brasilia, Brazil","institution_ids":["https://openalex.org/I150729083"]},{"raw_affiliation_string":"Dept. of Electr. Eng., Univ. of Brasilia, Brasilia, Brazil#TAB#","institution_ids":["https://openalex.org/I150729083"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014034048"],"corresponding_institution_ids":["https://openalex.org/I102335020"],"apc_list":null,"apc_paid":null,"fwci":1.636,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.87089591,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1623","last_page":"1627"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.7998228073120117},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7322864532470703},{"id":"https://openalex.org/keywords/oblivious-transfer","display_name":"Oblivious transfer","score":0.7108174562454224},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.542872965335846},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.47281184792518616},{"id":"https://openalex.org/keywords/transfer","display_name":"Transfer (computing)","score":0.46085065603256226},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4563586711883545},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.45379364490509033},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32810544967651367},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3279467821121216},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2750222682952881},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.20850735902786255},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1857408583164215},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09607723355293274}],"concepts":[{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.7998228073120117},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7322864532470703},{"id":"https://openalex.org/C53076038","wikidata":"https://www.wikidata.org/wiki/Q2915383","display_name":"Oblivious transfer","level":3,"score":0.7108174562454224},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.542872965335846},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47281184792518616},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.46085065603256226},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4563586711883545},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.45379364490509033},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32810544967651367},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3279467821121216},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2750222682952881},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.20850735902786255},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1857408583164215},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09607723355293274},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2014.6875108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6875108","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1498297643","https://openalex.org/W1513096110","https://openalex.org/W1513792611","https://openalex.org/W1530248577","https://openalex.org/W1533740008","https://openalex.org/W1547665694","https://openalex.org/W1547696874","https://openalex.org/W1576604556","https://openalex.org/W1579417917","https://openalex.org/W1840749574","https://openalex.org/W1958037614","https://openalex.org/W1968372742","https://openalex.org/W2016443801","https://openalex.org/W2020316223","https://openalex.org/W2049198367","https://openalex.org/W2075695434","https://openalex.org/W2084620606","https://openalex.org/W2104965768","https://openalex.org/W2119422255","https://openalex.org/W2134238617","https://openalex.org/W2150154572","https://openalex.org/W2157980424","https://openalex.org/W2167236842","https://openalex.org/W2570008916","https://openalex.org/W6629820281","https://openalex.org/W6631531956","https://openalex.org/W6671724386","https://openalex.org/W6677934245"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W2396543449","https://openalex.org/W2160125021","https://openalex.org/W2145580658"],"abstract_inverted_index":{"In":[0],"the":[1,5,8,22,35,42,50,56,62,78,81,94,98],"bounded":[2,43,99],"storage":[3,44,100],"model":[4,45],"memory":[6,79],"of":[7,14,24,29,80,97],"adversarial":[9],"parties":[10,58],"is":[11,84,103],"restricted,":[12],"instead":[13,65],"their":[15],"computational":[16],"power.":[17],"This":[18],"different":[19],"restriction":[20],"allows":[21],"construction":[23],"protocols":[25,88],"with":[26,46],"information-theoretical":[27],"(instead":[28],"only":[30,67,92],"computational)":[31],"security.":[32],"We":[33],"present":[34],"first":[36],"protocol":[37],"for":[38,93],"oblivious":[39],"transfer":[40,87],"in":[41],"errors,":[47],"i.e.,":[48],"where":[49],"public":[51],"random":[52],"sources":[53],"available":[54],"to":[55,69,105],"two":[57],"are":[59,66],"not":[60],"exactly":[61],"same,":[63],"but":[64],"required":[68],"have":[70],"a":[71],"small":[72],"Hamming":[73],"distance":[74],"between":[75],"themselves,":[76],"and":[77],"(adversarial)":[82],"receiver":[83],"limited.":[85],"Oblivious":[86],"were":[89],"known":[90],"previously":[91],"error-free":[95],"variant":[96],"model,":[101],"which":[102],"harder":[104],"realize.":[106]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
