Unforgeable noise-tolerant quantum tokens
暂无分享,去创建一个
Liang Jiang | J. Ignacio Cirac | Fernando Pastawski | Mikhail D. Lukin | Norman Y. Yao | J. Cirac | N. Yao | F. Pastawski | M. Lukin | Liang Jiang
[1] Gus Gutoski,et al. Toward a general theory of quantum games , 2006, STOC '07.
[2] Scott Aaronson,et al. Quantum Copy-Protection and Quantum Money , 2009, 2009 24th Annual IEEE Conference on Computational Complexity.
[3] R. Werner. OPTIMAL CLONING OF PURE STATES , 1998, quant-ph/9804001.
[4] L. Jiang,et al. Quantum Register Based on Individual Electronic and Nuclear Spin Qubits in Diamond , 2007, Science.
[5] G. M. D'Ariano,et al. Phase-covariant quantum cloning , 1999, quant-ph/9909046.
[6] Avinatan Hassidim,et al. Breaking and Making Quantum Money: Toward a New Quantum Cryptographic Protocol , 2009, ICS.
[7] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[8] Russell Impagliazzo,et al. Constructive Proofs of Concentration Bounds , 2010, APPROX-RANDOM.
[9] D. Wineland,et al. High-fidelity adaptive qubit detection through repetitive quantum nondemolition measurements. , 2007, Physical review letters.
[10] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[11] David Olaya,et al. Superconducting nanocircuits for topologically protected qubits , 2009 .
[12] M. Nielsen. A simple formula for the average gate fidelity of a quantum dynamical operation [rapid communication] , 2002, quant-ph/0205035.
[13] Avinatan Hassidim,et al. Quantum state restoration and single-copy tomography for ground states of Hamiltonians. , 2009, Physical review letters.
[14] Alexander Semenovich Holevo. Statistical problems in quantum physics , 1973 .
[15] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[16] Aiden A. Bruen,et al. Error-correcting Codes, Finite Geometries and Cryptography , 2010 .
[17] Renato Renner,et al. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. , 2007, Physical review letters.
[18] Aravind Srinivasan,et al. Randomized Distributed Edge Coloring via an Extension of the Chernoff-Hoeffding Bounds , 1997, SIAM J. Comput..
[19] M. L. W. Thewalt,et al. Quantum Information Storage for over 180 s Using Donor Spins in a 28Si “Semiconductor Vacuum” , 2012, Science.
[20] Huangjun Zhu,et al. Quantum state tomography with fully symmetric measurements and product measurements , 2011 .
[21] Hoi-Kwong Lo,et al. Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.
[22] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[23] Andrew Lutomirski. Component mixers and a hardness result for counterfeiting quantum money , 2011 .
[24] Eugene E. Haller,et al. Solid-state quantum memory using the 31P nuclear spin , 2008, Nature.
[25] M. Markham,et al. Ultralong spin coherence time in isotopically engineered diamond. , 2009, Nature materials.
[26] C Langer,et al. Long-lived qubit memory using atomic ions. , 2005, Physical review letters.
[27] Göran Wendin,et al. Scalable solid–state qubits: challenging decoherence and read–out , 2003, Philosophical Transactions of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.
[28] J. Cirac,et al. Room-Temperature Quantum Bit Memory Exceeding One Second , 2012, Science.