Quantum Non-malleability and Authentication
暂无分享,去创建一个
[1] A. Lichnerowicz. Proof of the Strong Subadditivity of Quantum-Mechanical Entropy , 2018 .
[2] R. Werner,et al. Counterexample to an additivity conjecture for output purity of quantum channels , 2002, quant-ph/0203003.
[3] R. Schumann. Quantum Information Theory , 2000, quant-ph/0010060.
[4] E. Lieb,et al. Proof of the strong subadditivity of quantum‐mechanical entropy , 1973 .
[5] Dominique Unruh,et al. Simulatable security for quantum protocols. (arXiv:quant-ph/0409125v2 CROSS LISTED) , 2004, quant-ph/0409125.
[6] Li Liu,et al. Near-linear constructions of exact unitary 2-designs , 2015, Quantum Inf. Comput..
[7] Christopher Portmann,et al. Quantum Authentication with Key Recycling , 2016, EUROCRYPT.
[8] Mark Zhandry,et al. New Security Notions and Feasibility Results for Authentication of Quantum Data , 2016, CRYPTO.
[9] A. Jamiołkowski. Linear transformations which preserve trace and positive semidefiniteness of operators , 1972 .
[10] Richard Andrew Low,et al. Pseudo-randonmess and Learning in Quantum Computation , 2010, 1006.5227.
[11] Anne Broadbent,et al. Efficient Simulation for Quantum Message Authentication , 2016, ICITS.
[12] J. Kowski. Linear transformations which preserve trace and positive semidefiniteness of operators , 1972 .
[13] Debbie W. Leung,et al. The Universal Composable Security of Quantum Message Authentication with Key Recyling , 2016, 1610.09434.
[14] Andris Ambainis,et al. Private quantum channels , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[15] Amiel Feinstein,et al. Information and information stability of random variables and processes , 1964 .
[16] Man-Duen Choi. Completely positive linear maps on complex matrices , 1975 .
[17] Mario Berta,et al. Catalytic Decoupling of Quantum Information. , 2016, Physical review letters.
[18] Elham Kashefi,et al. Universal Blind Quantum Computation , 2008, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[19] Keisuke Tanaka,et al. Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and Authenticity , 2011, ICITS.
[20] Elliott H. Lieb,et al. A Fundamental Property of Quantum-Mechanical Entropy , 1973 .
[21] Ueli Maurer,et al. Abstract Cryptography , 2011, ICS.
[22] M. Fannes. A continuity property of the entropy density for spin lattice systems , 1973 .
[23] Louis Salvail,et al. Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries , 2010, CRYPTO.
[24] Stacey Jeffery,et al. Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity , 2014, CRYPTO.
[25] E. Lieb,et al. A Fundamental Property of Quantum-Mechanical Entropy , 1973 .
[26] R. Renner,et al. One-Shot Decoupling , 2010, 1012.6044.
[27] Christoph Dankert,et al. Exact and approximate unitary 2-designs and their application to fidelity estimation , 2009 .
[28] R. Renner,et al. The Quantum Reverse Shannon Theorem Based on One-Shot Information Theory , 2009, 0912.3805.
[29] W. Stinespring. Positive functions on *-algebras , 1955 .
[30] Adam D. Smith,et al. Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[31] Christian Schaffner,et al. Quantum Homomorphic Encryption for Polynomial-Sized Circuits , 2016, CRYPTO.
[32] Mario Berta,et al. Deconstruction and conditional erasure of quantum correlations , 2016, Physical Review A.
[33] Andris Ambainis,et al. Nonmalleable encryption of quantum information , 2008, 0808.0353.
[34] Mark M. Wilde,et al. Quantum Information Theory , 2013 .
[35] Elad Eban,et al. Interactive Proofs For Quantum Computations , 2017, 1704.04487.
[36] F. Brandão,et al. Local random quantum circuits are approximate polynomial-designs: numerical results , 2012, 1208.0692.
[37] M. Fannes,et al. Continuity of quantum conditional information , 2003, quant-ph/0312081.
[38] Louis Salvail,et al. Actively Secure Two-Party Evaluation of Any Quantum Operation , 2012, CRYPTO.
[39] Scott Aaronson,et al. Improved Simulation of Stabilizer Circuits , 2004, ArXiv.
[40] I. Chuang,et al. Quantum Computation and Quantum Information: Bibliography , 2010 .
[41] Tommaso Gagliardoni,et al. Computational Security of Quantum Encryption , 2016, ICITS.
[42] Thierry Paul,et al. Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.
[43] K. Audenaert. A sharp continuity estimate for the von Neumann entropy , 2006, quant-ph/0610146.