Quantum Coins
暂无分享,去创建一个
[1] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[2] D. Dieks. Communication by EPR devices , 1982 .
[3] Gilles Brassard,et al. Quantum Cryptography, or Unforgeable Subway Tokens , 1982, CRYPTO.
[4] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[5] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[6] David Chaum,et al. Transferred Cash Grows in Size , 1992, EUROCRYPT.
[7] Gilles Brassard,et al. Tight bounds on quantum searching , 1996, quant-ph/9605034.
[8] Gilles Brassard,et al. Strengths and Weaknesses of Quantum Computing , 1997, SIAM J. Comput..
[9] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[10] D. James,et al. Qubit quantum state tomography , 2004 .
[11] Andrew M. Childs. Secure assisted quantum computation , 2001, Quantum Inf. Comput..
[12] Hoeteck Wee,et al. On obfuscating point functions , 2005, STOC '05.
[13] Andris Ambainis,et al. Quantum t-designs: t-wise Independence in the Quantum World , 2007, Twenty-Second Annual IEEE Conference on Computational Complexity (CCC'07).
[14] Alain Tapp,et al. Information-Theoretic Security Without an Honest Majority , 2007, ASIACRYPT.
[15] Gilles Brassard,et al. Anonymous Quantum Communication , 2007, ASIACRYPT.
[16] Elham Kashefi,et al. Universal Blind Quantum Computation , 2008, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[17] Scott Aaronson,et al. Quantum Copy-Protection and Quantum Money , 2009, 2009 24th Annual IEEE Conference on Computational Complexity.
[18] Douglas Stebila,et al. Classical Authenticated Key Exchange and Quantum Cryptography , 2009 .