Private Database Queries Using Quantum States with Limited Coherence Times
暂无分享,去创建一个
[1] Jorge Sánchez,et al. Entropic uncertainty and certainty relations for complementary observables , 1993 .
[2] Robert W. Heath,et al. On quasi-orthogonal signatures for CDMA systems , 2006, IEEE Transactions on Information Theory.
[3] Tad Hogg,et al. Quantum Auctions , 2007, 0704.0800.
[4] Maassen,et al. Generalized entropic uncertainty relations. , 1988, Physical review letters.
[5] Jiri Matousek,et al. Lectures on discrete geometry , 2002, Graduate texts in mathematics.
[6] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[7] Li Zhang,et al. REDUCED ENTANGLEMENT FOR QUANTUM GAMES , 2003 .
[8] William I. Gasarch,et al. A Survey on Private Information Retrieval (Column: Computational Complexity) , 2004, Bull. EATCS.
[9] Elias M. Stein,et al. Interpolation of linear operators , 1956 .
[10] David A. Meyer,et al. Quantum Communication in Games , 2004 .
[11] Y. Katznelson. An Introduction to Harmonic Analysis: Interpolation of Linear Operators , 1968 .
[12] Pierfrancesco La Mura. Correlated Equilibria of Classical Strategic Games with Quantum Signals , 2003, ArXiv.
[13] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[14] Ronald de Wolf,et al. Quantum symmetrically-private information retrieval , 2003, Inf. Process. Lett..
[15] Ashwin Nayak,et al. Optimal lower bounds for quantum automata and random access codes , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[16] Claude Crépeau,et al. Oblivious transfer with a memory-bounded receiver , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[17] A. Calderbank,et al. Z4‐Kerdock Codes, Orthogonal Spreads, and Extremal Euclidean Line‐Sets , 1997 .
[18] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[19] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[20] I. Chuang,et al. Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .
[21] Tad Hogg,et al. Quantum Solution of Coordination Problems , 2003, Quantum Inf. Process..
[22] S. J. van Enk,et al. Classical rules in quantum games , 2002 .
[23] Andris Ambainis,et al. Dense quantum coding and quantum finite automata , 2002, JACM.
[24] Tad Hogg,et al. QUANTUM AUCTIONS USING ADIABATIC EVOLUTION: THE CORRUPT AUCTIONEER AND CIRCUIT IMPLEMENTATIONS , 2007, 0707.2051.
[25] Nicholas M. Katz,et al. Random matrices, Frobenius eigenvalues, and monodromy , 1998 .
[26] Tad Hogg,et al. Protecting privacy while revealing data , 2002, Nature Biotechnology.
[27] Tad Hogg,et al. A Quantum Treatment of Public Goods Economics , 2002, Quantum Inf. Process..
[28] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[29] Hoi-Kwong Lo,et al. Insecurity of Quantum Secure Computations , 1996, ArXiv.