暂无分享,去创建一个
[1] Hoi-Kwong Lo,et al. Is Quantum Bit Commitment Really Possible? , 1996, ArXiv.
[2] J. Eisert,et al. Multiparty entanglement in graph states , 2003, quant-ph/0307130.
[3] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[4] E. Kashefi,et al. Unconditionally verifiable blind quantum computation , 2012, 1203.5217.
[5] Yehuda Lindell,et al. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries , 2007, Journal of Cryptology.
[6] E. Kashefi,et al. Unconditionally verifiable blind computation , 2012 .
[7] Avinatan Hassidim,et al. Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[8] Louis Salvail,et al. Actively Secure Two-Party Evaluation of Any Quantum Operation , 2012, CRYPTO.
[9] Elham Kashefi,et al. Garbled Quantum Computation , 2017, Cryptogr..
[10] Louis Salvail,et al. On the Power of Two-Party Quantum Cryptography , 2009, ASIACRYPT.
[11] Petros Wallden,et al. Optimised resource construction for verifiable quantum computation , 2015 .
[12] Anne Broadbent,et al. How to Verify a Quantum Computation , 2015, Theory Comput..
[13] Hoi-Kwong Lo,et al. Insecurity of Quantum Secure Computations , 1996, ArXiv.
[14] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[15] H.C.A. van Tilborg,et al. Secure and fair two-party computation , 2007 .
[16] R Raussendorf,et al. A one-way quantum computer. , 2001, Physical review letters.
[17] Masahito Hayashi,et al. Verifiable Measurement-Only Blind Quantum Computing with Stabilizer Testing. , 2015, Physical review letters.
[18] Yehuda Lindell,et al. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , 2007, Journal of Cryptology.
[19] Adam D. Smith,et al. Secure multi-party quantum computation , 2002, STOC '02.
[20] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[21] K. K. Nambiar,et al. Foundations of Computer Science , 2001, Lecture Notes in Computer Science.
[22] John Watrous. Zero-Knowledge against Quantum Attacks , 2009, SIAM J. Comput..
[23] Dominique Unruh,et al. Quantum Proofs of Knowledge , 2012, IACR Cryptol. ePrint Arch..
[24] Elham Kashefi,et al. Blind Multiparty Quantum Computing , 2016 .
[25] Elham Kashefi,et al. Universal Blind Quantum Computation , 2008, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[26] E. Kashefi,et al. Determinism in the one-way model , 2005, quant-ph/0506062.
[27] Dominic Mayers. Unconditionally secure quantum bit commitment is impossible , 1997 .
[28] Elham Kashefi,et al. Multiparty Delegated Quantum Computing , 2016, Cryptogr..
[29] Yehuda Lindell,et al. A Proof of Yao's Protocol for Secure Two-Party Computation , 2004, Electron. Colloquium Comput. Complex..
[30] Yehuda Lindell,et al. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , 2007, EUROCRYPT.
[31] Louis Salvail,et al. Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries , 2010, CRYPTO.
[32] Joseph Fitzsimons,et al. Composable Security of Delegated Quantum Computation , 2013, ASIACRYPT.