Optimal Counterfeiting Attacks and Generalizations for Wiesner’s Quantum Money
From MaRDI portal
Publication:3455197
DOI10.1007/978-3-642-35656-8_4zbMath1451.81214arXiv1202.4010OpenAlexW2234900041WikidataQ59792712 ScholiaQ59792712MaRDI QIDQ3455197
Abel Molina, John Watrous, Thomas Vidick
Publication date: 3 December 2015
Published in: Theory of Quantum Computation, Communication, and Cryptography (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1202.4010
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items
Quantum cheques, Transferable quantum cheque scheme based on quantum public-key cryptography, Semi-quantum money, Experimental realization of quantum cheque using a five-qubit quantum computer, Quantum cryptography beyond quantum key distribution, Shadow Tomography of Quantum States, S-money: virtual tokens for a relativistic economy, Classical proofs of quantum knowledge, A search for quantum coin-flipping protocols using optimization techniques
Cites Work
- Completely positive linear maps on complex matrices
- Aspects of semidefinite programming. Interior point algorithms and selected applications
- Linear transformations which preserve trace and positive semidefiniteness of operators
- Unconditional security in quantum cryptography
- Designing optimal quantum detectors via semidefinite programming
- Symmetric informationally complete quantum measurements
- Semidefinite Programming
- A single quantum cannot be cloned
- Product Rules in Semidefinite Programming