Secure two-party computation based on blind quantum computation
From MaRDI portal
Publication:2196995
Recommendations
Cites work
- scientific article; zbMATH DE number 1263182 (Why is no real title available?)
- Application of blind quantum computation to two-party quantum computation
- How to Verify a Quantum Computation
- Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries
- Secure assisted quantum computation
- Universal Blind Quantum Computation
Cited in
(8)- Secure multi-party quantum computation based on blind quantum computation
- Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries
- Application of blind quantum computation to two-party quantum computation
- Secure assisted quantum computation
- Secure two-party computation in a quantum world
- Susceptible Two-Party Quantum Computations
- Actively secure two-party evaluation of any quantum operation
- A generic quantum protocol for one-sided secure two-party classical computations
This page was built for publication: Secure two-party computation based on blind quantum computation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2196995)