Quantum cryptography beyond quantum key distribution (Q908054): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Quantum money from hidden subspaces / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum money from knots / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum bit escrow / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Simpler Proof of the Existence of Quantum Weak Coin Flipping with Arbitrarily Small Bias / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4228459 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using quantum key distribution for cryptographic purposes: a survey / rank
 
Normal rank
Property / cites work
 
Property / cites work: BLIND QUANTUM COMPUTATION / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the (im)possibility of obfuscating programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Demonstration of Blind Quantum Computing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum cryptography: public key distribution and coin tossing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Experimental quantum cryptography. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum cryptography without Bell’s theorem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum cryptography. II: How to re-use a one-time pad safely even if \(\mathrm P=\mathrm{NP}\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Post-Quantum Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Algorithms for the Subset-Sum Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Entanglement Cost of Quantum Channels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum to Classical Randomness Extractors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Coin flipping by telephone a protocol for solving impossible problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World / rank
 
Normal rank
Property / cites work
 
Property / cites work: Random Oracles in a Quantum World / rank
 
Normal rank
Property / cites work
 
Property / cites work: An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934731 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279563 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4240337 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4819589 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Anonymous Quantum Communication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Merkle Puzzles in a Quantum World / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universal Blind Quantum Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum One-Time Programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: The garden-hose model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Position-Based Quantum Cryptography: Impossibility and Constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364559 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Quantum Strong Coin Flipping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Bounds for Quantum Bit Commitment / rank
 
Normal rank
Property / cites work
 
Property / cites work: Position Based Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3522545 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing elliptic curve isogenies in quantum subexponential time / rank
 
Normal rank
Property / cites work
 
Property / cites work: A short impossibility proof of quantum bit commitment / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Garden Hose Complexity for the Equality Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Anonymous Transmissions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proposed Experiment to Test Local Hidden-Variable Theories / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information-Theoretic Conditions for Two-Party Secure Function Evaluation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two Provers in Isolation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography in the Bounded-Quantum-Storage Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Quantum Cipher with Near Optimal Key-Recycling / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Tight High-Order Entropic Quantum Uncertainty Relation with Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Identification and QKD in the Bounded-Quantum-Storage Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improving the Security of Quantum Protocols via Commit-and-Open / rank
 
Normal rank
Property / cites work
 
Property / cites work: Superposition Attacks on Cryptographic Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Entropic security in quantum cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Entropic Security and Approximate Quantum Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Composable Security of Delegated Quantum Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Actively Secure Two-Party Evaluation of Any Quantum Operation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Entanglement Sampling and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement / rank
 
Normal rank
Property / cites work
 
Property / cites work: Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum cryptography based on Bell’s theorem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3325625 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-prover Commitments Against Non-signaling Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Composing Quantum Protocols in a Classical Environment / rank
 
Normal rank
Property / cites work
 
Property / cites work: Feasibility and Completeness of Cryptographic Tasks in the Quantum World / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Private Queries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Private Queries: Security Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5465361 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Knowledge Complexity of Interactive Proof Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3522455 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4228473 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast quantum algorithms for computing the unit group and class group of a number field / rank
 
Normal rank
Property / cites work
 
Property / cites work: Polynomial-time quantum algorithms for Pell's equation and the principal ideal problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Classical Cryptographic Protocols in a Quantum World / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight Bounds for Classical and Quantum Coin Flipping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Device-Independent Quantum Key Distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomizing quantum states: constructions and applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the (Im-)Possibility of Extending Coin Toss / rank
 
Normal rank
Property / cites work
 
Property / cites work: Building one-time memories from isolated qubits / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to delegate computations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3410550 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Bounds for the Garden-Hose Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search / rank
 
Normal rank
Property / cites work
 
Property / cites work: Classical leakage resilience from fault-tolerant quantum computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3522361 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Single-Shot Security for One-Time Memories in the Isolated Qubits Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privacy Amplification in the Isolated Qubits Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Self-testing of Quantum Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4318715 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Key Distribution and String Oblivious Transfer in Noisy Channels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unconditional security in quantum cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3522483 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust self-testing of the singlet / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure communications over insecure channels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Computer Science / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2958429 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Counterfeiting Attacks and Generalizations for Wiesner’s Quantum Money / rank
 
Normal rank
Property / cites work
 
Property / cites work: Encyclopedia of Complexity and Systems Science / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3000895 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2706552 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Decade of Lattice Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Computation and Lattice Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: SECURITY OF QUANTUM KEY DISTRIBUTION / rank
 
Normal rank
Property / cites work
 
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249343 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantifying the leakage of quantum protocols for classical two-party cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Bounds for Quantum Cryptography with Finite Resources / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Note on Quantum Security for Post-Quantum Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Case for Quantum Key Distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Experimental test of relativistic quantum state collapse with moving reference frames / rank
 
Normal rank
Property / cites work
 
Property / cites work: The ''transition probability'' in the state space of a \(^*\)-algebra / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universally Composable Quantum Multi-party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Concurrent Composition in the Bounded Quantum Storage Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Proofs of Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Everlasting Multi-party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Position Verification in the Random Oracle Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revocable Quantum Timed-Release Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Certifiable quantum dice / rank
 
Normal rank
Property / cites work
 
Property / cites work: Principles of Distributed Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Zero-knowledge against quantum attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the complexity of simulating space-bounded quantum computations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Entropic uncertainty relations—a survey / rank
 
Normal rank
Property / cites work
 
Property / cites work: Composable Security in the Bounded-Quantum-Storage Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3400486 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3671875 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Information Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: A single quantum cannot be cloned / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4234052 / rank
 
Normal rank

Latest revision as of 10:33, 11 July 2024

scientific article
Language Label Description Also known as
English
Quantum cryptography beyond quantum key distribution
scientific article

    Statements

    Quantum cryptography beyond quantum key distribution (English)
    0 references
    0 references
    0 references
    2 February 2016
    0 references
    0 references
    conjugate coding
    0 references
    delegated quantum computation
    0 references
    limited-quantum-storage models
    0 references
    quantum money
    0 references
    quantum two-party computation
    0 references
    survey
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references