Position-Based Quantum Cryptography and the Garden-Hose Game
暂无分享,去创建一个
[1] I. Chuang,et al. Quantum Computation and Quantum Information: Bibliography , 2010 .
[2] Salman Beigi,et al. Simplified instantaneous non-local quantum computation with applications to position-based cryptography , 2011, 1101.1065.
[3] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[4] Laurent Bussard. Trust establishment protocols for communicating devices , 2004 .
[5] Adrian Kent,et al. Quantum Tagging: Authenticating Location via Quantum Information and Relativistic Signalling Constraints , 2010, ArXiv.
[6] Srdjan Capkun,et al. Secure Localization with Hidden and Mobile Base Stations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[7] Bart Preneel,et al. Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[8] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[9] Rafail Ostrovsky,et al. Position Based Cryptography , 2009, CRYPTO.
[10] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[11] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[12] Mikhail Nesterenko,et al. Secure Location Verification Using Radio Broadcast , 2004, OPODIS.
[13] Yuguang Fang,et al. Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[14] Ronald de Wolf,et al. Quantum Proofs for Classical Theorems , 2009, Theory Comput..
[15] David A. Mix Barrington,et al. Bounded-width polynomial-size branching programs recognize exactly those languages in NC1 , 1986, STOC '86.
[16] Rafail Ostrovsky,et al. Position-Based Quantum Cryptography: Impossibility and Constructions , 2011, IACR Cryptol. ePrint Arch..
[17] Caslav Brukner,et al. Mutually unbiased binary observable sets on N qubits , 2002 .
[18] R. Feynman. Simulating physics with computers , 1999 .
[19] Pierre McKenzie,et al. Reversible Space Equals Deterministic Space , 2000, J. Comput. Syst. Sci..
[20] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..