Position-Based Quantum Cryptography and the Garden-Hose Game

[1]  I. Chuang,et al.  Quantum Computation and Quantum Information: Bibliography , 2010 .

[2]  Salman Beigi,et al.  Simplified instantaneous non-local quantum computation with applications to position-based cryptography , 2011, 1101.1065.

[3]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[4]  Laurent Bussard Trust establishment protocols for communicating devices , 2004 .

[5]  Adrian Kent,et al.  Quantum Tagging: Authenticating Location via Quantum Information and Relativistic Signalling Constraints , 2010, ArXiv.

[6]  Srdjan Capkun,et al.  Secure Localization with Hidden and Mobile Base Stations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[7]  Bart Preneel,et al.  Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[8]  David Chaum,et al.  Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.

[9]  Rafail Ostrovsky,et al.  Position Based Cryptography , 2009, CRYPTO.

[10]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[11]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[12]  Mikhail Nesterenko,et al.  Secure Location Verification Using Radio Broadcast , 2004, OPODIS.

[13]  Yuguang Fang,et al.  Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[14]  Ronald de Wolf,et al.  Quantum Proofs for Classical Theorems , 2009, Theory Comput..

[15]  David A. Mix Barrington,et al.  Bounded-width polynomial-size branching programs recognize exactly those languages in NC1 , 1986, STOC '86.

[16]  Rafail Ostrovsky,et al.  Position-Based Quantum Cryptography: Impossibility and Constructions , 2011, IACR Cryptol. ePrint Arch..

[17]  Caslav Brukner,et al.  Mutually unbiased binary observable sets on N qubits , 2002 .

[18]  R. Feynman Simulating physics with computers , 1999 .

[19]  Pierre McKenzie,et al.  Reversible Space Equals Deterministic Space , 2000, J. Comput. Syst. Sci..

[20]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..