On Quantum and Approximate Privacy
暂无分享,去创建一个
[1] Eyal Kushilevitz,et al. On the structure of the privacy hierarchy , 2004, Journal of Cryptology.
[2] Andris Ambainis,et al. The Quantum Communication Complexity of Sampling , 2003, SIAM J. Comput..
[3] A. Razborov. Quantum communication complexity of symmetric predicates , 2002, quant-ph/0204025.
[4] Ziv Bar-Yossef,et al. An information statistics approach to data stream and communication complexity , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[5] Hoi-Kwong Lo,et al. Insecurity of Quantum Secure Computations , 1996, ArXiv.
[6] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[7] Andrew Chi-Chih Yao,et al. Quantum Circuit Complexity , 1993, FOCS.
[8] Eyal Kushilevitz,et al. Communication Complexity: Index of Notation , 1996 .
[9] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[10] Rafail Ostrovsky,et al. Characterizing linear size circuits in terms of privacy , 1996, STOC '96.
[11] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[12] Bala Kalyanasundaram,et al. The Probabilistic Communication Complexity of Set Intersection , 1992, SIAM J. Discret. Math..
[13] Eyal Kushilevitz,et al. Privacy and communication complexity , 1989, 30th Annual Symposium on Foundations of Computer Science.
[14] Andrew Chi-Chih Yao,et al. Informational complexity and the direct sum problem for simultaneous message complexity , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[15] Donald Beaver. Perfect Privacy For Two-Party Protocols , 1989, Distributed Computing And Cryptography.
[16] Ilan Newman,et al. Private vs. Common Random Bits in Communication Complexity , 1991, Inf. Process. Lett..
[17] Hartmut Klauck,et al. Interaction in quantum communication and the complexity of set disjointness , 2001, STOC '01.
[18] Noam Nisan,et al. Quantum circuits with mixed states , 1998, STOC '98.
[19] Thomas M. Cover,et al. Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing) , 2006 .
[20] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[21] Gilles Brassard,et al. Strengths and Weaknesses of Quantum Computing , 1997, SIAM J. Comput..
[22] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[23] Eyal Kushilevitz,et al. A zero-one law for Boolean privacy , 1989, STOC '89.
[24] Peter Frankl,et al. Complexity classes in communication complexity theory , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[25] Avi Wigderson,et al. Quantum vs. classical communication and computation , 1998, STOC '98.
[26] Gilles Brassard,et al. Tight bounds on quantum searching , 1996, quant-ph/9605034.
[27] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[28] Reuven Bar-Yehuda,et al. Privacy, additional information and communication , 1993, IEEE Trans. Inf. Theory.
[29] H. F. Chau,et al. Why quantum bit commitment and ideal quantum coin tossing are impossible , 1997 .
[30] Buzek,et al. Quantum copying: Beyond the no-cloning theorem. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[31] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.