Quantum Oblivious Transfer: a secure practical implementation
暂无分享,去创建一个
[1] Ivan Damgård,et al. Cryptography in the bounded quantum-storage model , 2005, IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005..
[2] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[3] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[4] Claude Crépeau,et al. Equivalence Between Two Flavours of Oblivious Transfers , 1987, CRYPTO.
[5] Dominic Mayers. Unconditionally secure quantum bit commitment is impossible , 1997 .
[6] Joe Kilian,et al. Achieving oblivious transfer using weakened security assumptions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[7] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[8] L. Salvail,et al. Quantum oblivious transfer is secure against all individual measurements , 1994, Proceedings Workshop on Physics and Computation. PhysComp '94.
[9] Qiaoyan Wen,et al. Practical quantum all-or-nothing oblivious transfer protocol , 2014, Quantum Inf. Process..
[10] Andrew Chi-Chih Yao,et al. Security of quantum protocols against coherent measurements , 1995, STOC '95.
[11] Li Yang. Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding , 2013, ArXiv.