Improved and Formal Proposal for Device Independent Quantum Private Query
暂无分享,去创建一个
Arpita Maitra | Subhamoy Maitra | Kaushik Chakraborty | Jyotirmoy Basak | S. Maitra | Kaushik Chakraborty | Arpita Maitra | Jyotirmoy Basak
[1] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[2] I. D. Ivanović. How to differentiate between non-orthogonal states , 1987 .
[3] Sanjeev Kumar Mishra. On Symmetrically Private Information Retrieval , 2000, IACR Cryptol. ePrint Arch..
[4] Peng Xu,et al. Flexible protocol for quantum private query based on B92 protocol , 2014, Quantum Inf. Process..
[5] Jkedrzej Kaniewski,et al. Self-testing of binary observables based on commutation , 2017, 1702.06845.
[6] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[7] Christoph Simon,et al. Practical private database queries based on a quantum-key-distribution protocol , 2010, 1002.4360.
[8] Christoph Simon,et al. Performing private database queries in a real-world environment using a quantum protocol , 2013, Scientific Reports.
[9] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[10] Iordanis Kerenidis,et al. Lower bounds for quantum oblivious transfer , 2010, Quantum Inf. Comput..
[11] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[12] Umesh V. Vazirani,et al. A classical leash for a quantum system: command of quantum systems via rigidity of CHSH games , 2012, ITCS '13.
[13] Robert König,et al. The Operational Meaning of Min- and Max-Entropy , 2008, IEEE Transactions on Information Theory.
[14] M. V. Panduranga Rao,et al. Towards communication-efficient quantum oblivious key distribution , 2012, 1208.2501.
[15] Seth Lloyd,et al. Quantum private queries. , 2007, Physical review letters.
[16] Moni Naor,et al. Computationally Secure Oblivious Transfer , 2004, Journal of Cryptology.
[17] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[18] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[19] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[20] Subhamoy Maitra,et al. Clauser–Horne–Shimony–Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query , 2018, Quantum Inf. Process..
[21] Seth Lloyd,et al. Quantum random access memory. , 2007, Physical review letters.
[22] Jeffrey Scott Vitter,et al. Proceedings of the thirtieth annual ACM symposium on Theory of computing , 1998, STOC 1998.
[23] Hui Chen,et al. Flexible quantum private queries based on quantum key distribution. , 2011, Optics express.
[24] Benjamin J. Keele,et al. Cambridge University Press v. Georgia State University , 2016 .
[25] R. Rosenfeld. Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.
[26] T. Noh. Counterfactual quantum cryptography. , 2008, Physical review letters.
[27] Seth Lloyd,et al. Quantum Private Queries: Security Analysis , 2008, IEEE Transactions on Information Theory.
[28] Rafail Ostrovsky,et al. Single Database Private Information Retrieval Implies Oblivious Transfer , 2000, EUROCRYPT.
[29] Dan Suciu,et al. Journal of the ACM , 2006 .
[30] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[31] Craig Gentry,et al. Single-Database Private Information Retrieval with Constant Communication Rate , 2005, ICALP.
[32] Hoi-Kwong Lo,et al. Insecurity of Quantum Secure Computations , 1996, ArXiv.
[33] Louis Salvail,et al. On the Power of Two-Party Quantum Cryptography , 2009, ASIACRYPT.
[34] Jeroen van de Graaf,et al. Cryptographic Distinguishability Measures for Quantum-Mechanical States , 1997, IEEE Trans. Inf. Theory.
[35] Guang-Can Guo,et al. Quantum strategies of quantum measurements , 2001 .
[36] Fei Gao,et al. Private database queries based on counterfactual quantum key distribution , 2013 .
[37] C. Helstrom. Quantum detection and estimation theory , 1969 .
[38] Zach DeVito,et al. Opt , 2017 .
[39] Rafail Ostrovsky,et al. A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.
[40] Lukasz Olejnik,et al. Secure quantum private information retrieval using phase-encoded queries , 2011 .
[41] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[42] Fei Gao,et al. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol , 2014, Scientific Reports.
[43] G. Paul,et al. Device Independent Quantum Private Query , 2017, 1701.01087.