暂无分享,去创建一个
[1] Christopher Portmann,et al. Quantum Authentication with Key Recycling , 2016, EUROCRYPT.
[2] Christian Schaffner,et al. Quantum Fully Homomorphic Encryption with Verification , 2017, ASIACRYPT.
[3] Mark Zhandry,et al. New Security Notions and Feasibility Results for Authentication of Quantum Data , 2016, CRYPTO.
[4] Elad Eban,et al. Interactive Proofs For Quantum Computations , 2017, 1704.04487.
[5] Peter W. Shor,et al. Fault-tolerant quantum computation , 1996, Proceedings of 37th Conference on Foundations of Computer Science.
[6] Christoph Dankert,et al. Exact and approximate unitary 2-designs and their application to fidelity estimation , 2009 .
[7] Debbie W. Leung,et al. The Universal Composable Security of Quantum Message Authentication with Key Recyling , 2016, 1610.09434.
[8] Gus Gutoski,et al. Quantum one-time programs , 2013, IACR Cryptol. ePrint Arch..
[9] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[10] Louis Salvail,et al. Actively Secure Two-Party Evaluation of Any Quantum Operation , 2012, CRYPTO.
[11] I. Chuang,et al. Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .
[12] Fang Song,et al. Zero-Knowledge Proof Systems for QMA , 2016, 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS).
[13] Tommaso Gagliardoni,et al. Unforgeable Quantum Encryption , 2017, IACR Cryptol. ePrint Arch..
[14] Lov K. Grover,et al. Quantum computation , 1999, Proceedings Twelfth International Conference on VLSI Design. (Cat. No.PR00013).
[15] Anne Broadbent,et al. Efficient Simulation for Quantum Message Authentication , 2016, ICITS.
[16] Michal Horodecki,et al. How to reuse a one-time pad and other notes on authentication encryption and protection of quantum information , 2003, ArXiv.
[17] Adam D. Smith,et al. Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[18] Gorjan Alagic,et al. Quantum Non-malleability and Authentication , 2016, CRYPTO.
[19] Serge Fehr,et al. Quantum Authentication and Encryption with Key Recycling , 2016, IACR Cryptol. ePrint Arch..
[20] Richard M. Wilson,et al. On $t$-designs , 1975 .