Pages that link to "Item:Q3563852"
From MaRDI portal
The following pages link to Universally Composable Quantum Multi-party Computation (Q3563852):
Displaying 24 items.
- Quantum cryptography beyond quantum key distribution (Q908054) (← links)
- Quantum solution to a class of two-party private summation problems (Q1700369) (← links)
- A protocol for the secure two-party quantum scalar product (Q1947681) (← links)
- Everlasting multi-party computation (Q1994636) (← links)
- Oblivious transfer is in MiniQCrypt (Q2056751) (← links)
- Secure two-party integer comparison protocol without any third party (Q2099648) (← links)
- On the concurrent composition of quantum zero-knowledge (Q2120082) (← links)
- Round efficient secure multiparty quantum computation with identifiable abort (Q2120089) (← links)
- Composable and finite computational security of quantum message transmission (Q2175915) (← links)
- Improvements on: ``Multi-party quantum key agreement protocol with Bell states and single particles'' (Q2190541) (← links)
- Secure two-party computation in a quantum world (Q2229292) (← links)
- Quantum private comparison with a malicious third party (Q2355616) (← links)
- Quantum Bell states-based anonymous voting with anonymity trace (Q2690299) (← links)
- Security limitations of classical-client delegated quantum computing (Q2692401) (← links)
- Secure quantum computation with classical communication (Q2695622) (← links)
- Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications (Q2829942) (← links)
- Computational Security of Quantum Encryption (Q2953808) (← links)
- Efficient Simulation for Quantum Message Authentication (Q2953810) (← links)
- Quantum Cryptography: Key Distribution and Beyond (Q5134949) (← links)
- Robustness and device independence of verifiable blind quantum computing (Q5151595) (← links)
- Quantum Authentication with Key Recycling (Q5270367) (← links)
- Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought) (Q5271780) (← links)
- Dispelling myths on superposition attacks: formal security model and attack analyses (Q5918646) (← links)
- Categorical composable cryptography: extended version (Q6178713) (← links)