Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries
暂无分享,去创建一个
[1] Andris Ambainis,et al. Private quantum channels , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[2] Hoi-Kwong Lo,et al. Is Quantum Bit Commitment Really Possible? , 1996, ArXiv.
[3] Peter W. Shor,et al. Fault-tolerant quantum computation , 1996, Proceedings of 37th Conference on Foundations of Computer Science.
[4] October I. Physical Review Letters , 2022 .
[5] Gus Gutoski,et al. Quantum Interactive Proofs with Competing Provers , 2004, STACS.
[6] S. Popescu,et al. Quantum nonlocality as an axiom , 1994 .
[7] Yuval Ishai,et al. Founding Cryptography on Oblivious Transfer - Efficiently , 2008, CRYPTO.
[8] Charles H. Bennett,et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.
[9] Hoi-Kwong Lo,et al. Insecurity of Quantum Secure Computations , 1996, ArXiv.
[10] Adam D. Smith,et al. Secure multi-party quantum computation , 2002, STOC '02.
[11] Stefan Wolf,et al. Oblivious transfer and quantum non-locality , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[12] Louis Salvail,et al. On the Power of Two-Party Quantum Cryptography , 2009, ASIACRYPT.
[13] Elham Kashefi,et al. Universal Blind Quantum Computation , 2008, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[14] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[15] Isaac L. Chuang,et al. Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations , 1999, Nature.
[16] John Watrous,et al. Limits on the power of quantum statistical zero-knowledge , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[17] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[18] Dorit Aharonov,et al. Fault-tolerant quantum computation with constant error , 1997, STOC '97.
[19] I. Chuang,et al. Quantum Teleportation is a Universal Computational Primitive , 1999, quant-ph/9908010.
[20] Serge Fehr,et al. Improving the Security of Quantum Protocols , 2009 .
[21] Dominic Mayers. Unconditionally secure quantum bit commitment is impossible , 1997 .
[22] S. Popescu,et al. Causality and nonlocality as axioms for quantum mechanics , 1997, quant-ph/9709026.
[23] Robert König,et al. Universally Composable Privacy Amplification Against Quantum Adversaries , 2004, TCC.
[24] Avinatan Hassidim,et al. Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[25] I. Chuang,et al. Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .
[26] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).