Composable security of measuring-Alice blind quantum computation
暂无分享,去创建一个
[1] Tomoyuki Morimae. Continuous-variable blind quantum computation. , 2012, Physical review letters.
[2] Gisin,et al. Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[3] M. Horodecki,et al. Locking classical correlations in quantum States. , 2003, Physical review letters.
[4] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[5] Keisuke Fujii,et al. Blind topological measurement-based quantum computation , 2011, Nature Communications.
[6] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[7] Elham Kashefi,et al. Blind quantum computing with weak coherent pulses. , 2011, Physical review letters.
[8] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[9] Elham Kashefi,et al. Ancilla-driven universal quantum computation , 2010 .
[10] T. Morimae,et al. Ancilla-Driven Universal Blind Quantum Computation , 2012, 1210.7450.
[11] Elham Kashefi,et al. Universal Blind Quantum Computation , 2008, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[12] R Raussendorf,et al. A one-way quantum computer. , 2001, Physical review letters.
[13] T. Ralph,et al. Universal quantum computation with continuous-variable cluster states. , 2006, Physical review letters.
[14] Robert Raussendorf,et al. Topological fault-tolerance in cluster state quantum computation , 2007 .
[15] E. Lieb,et al. Valence bond ground states in isotropic quantum antiferromagnets , 1988 .
[16] Joseph Fitzsimons,et al. Composable Security of Delegated Quantum Computation , 2013, ASIACRYPT.
[17] Birgit Pfitzmann,et al. The reactive simulatability (RSIM) framework for asynchronous systems , 2007, Inf. Comput..
[18] A. Miyake,et al. Measurement-based quantum computer in the gapped ground state of a two-body Hamiltonian. , 2008, Physical review letters.
[19] Ueli Maurer,et al. Small accessible quantum information does not imply security. , 2007, Physical review letters.
[20] Elham Kashefi,et al. Demonstration of Blind Quantum Computing , 2011, Science.