scientific article

From MaRDI portal
Publication:3671875

zbMath0521.94003MaRDI QIDQ3671875

Stephen J. Wiesner

Publication date: 1983


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

Franchised quantum moneyQuantum encryption with certified deletion, revisited: public key, attribute-based, and classical communicationA proposal for device independent probabilistic quantum oblivious transferA new framework for quantum oblivious transferOn the complete description of entangled systems. I: Exploring hidden variables and context communication cost in simulating quantum correlationsCloning games: a general framework for unclonable primitivesPublicly-verifiable deletion via target-collapsing functionsCryptography with certified deletionHidden cosets and applications to unclonable cryptographyOblivious transfer and quantum channels as communication resourcesComputational quantum key distribution (CQKD) on decentralized ledger and blockchainThe population inversion and the entropy of a moving two-level atom in interaction with a quantized fieldWhy protective measurement does not establish the reality of the quantum stateSplitting unknown qubit state using five-qubit entangled stateControlling the key by choosing the detection bits in quantum cryptographic protocolsDo transitive preferences always result in indifferent divisions?Random access test as an identifier of nonclassicality*Quantum Cryptography over Underground Optical FibersGame-theoretic perspective of Ping-Pong protocolAuthenticated semi-quantum key distributions without classical channelQuantum chequesMisdirection steganographyStudy of potential games using Ising interactionMinimum disclosure proofs of knowledgeTransferable quantum cheque scheme based on quantum public-key cryptographyEfficient arbitrated quantum signature and its proof of securityQuantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptionsSemi-quantum moneyThe Simplest Protocol for Oblivious TransferQuantum cryptography without public announcement of basesCryptanalysis of three quantum money schemesA review of quantum and hybrid quantum/classical blockchain protocolsA generic quantum protocol for one-sided secure two-party classical computationsImplementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computerNonlocal correlations and noise in different settings of a two-player gameComputational Security of Quantum EncryptionDynamic full quantum one-way function based on quantum circuit mappingPhysical Limitations of Quantum Cryptographic Primitives or Optimal Bounds for Quantum Coin Flipping and Bit CommitmentMulticharacters remote rotation sharing with five-particle cluster stateCryptography from pseudorandom quantum statesSource-device-independent randomness expansion using quantum random access codesExpanding the sharpness parameter area based on sequential \(3 \rightarrow 1\) parity-oblivious quantum random access codeOn the feasibility of unclonable encryption, and moreQuantum private comparison protocol based on 4D GHZ-like statesHierarchical quantum information splitting of an arbitrary \(m\)-qudit state with multipartyRole of Steering Inequality in Quantum Key Distribution ProtocolCollusion resistant copy-protection for watermarkable functionalitiesImproved multiparty quantum private comparison based on quantum homomorphic encryptionQuantum public-key encryption schemes based on conjugate codingPublic key encryption with secure key leasingAnother round of breaking and making quantum money: how to not build it from lattices, and moreQuantum contracts between Schrödinger and a catExperimental realization of quantum cheque using a five-qubit quantum computerQuantum key distribution without the wavefunctionFinding collisions in a quantum world: quantum black-box separation of collision-resistance and one-waynessPractical efficient 1-out-of-n quantum oblivious transfer protocolQuantum money with mintage supervisionQuantum cryptography beyond quantum key distributionComposable Security in the Bounded-Quantum-Storage ModelSecure software leasing without assumptionsUnclonable encryption, revisitedAn efficient quantum somewhat homomorphic symmetric searchable encryptionHierarchical quantum information splitting with eight-qubit cluster statesCryptanalysis of a new circular quantum secret sharing protocol for remote agentsImplementation of an E-payment security evaluation system based on quantum blind computingPractical quantum bit commitment protocolRevisiting ``The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solutionTransitivity vs. Intransitivity in decision making process - an example in quantum game theoryLong term confidentiality: a surveySecret sharing of quantum information via entanglement swapping in cavity QEDUsing quantum key distribution for cryptographic purposes: a surveyNon-contextual chocolate balls versus value indefinite quantum cryptographyEfficient, actively secure MPC with a dishonest majority: a surveyQuantum identity authentication without entanglementThe statistical fluctuation study of quantum key distribution in means of uncertainty principleQuantum oblivious transfer: a secure practical implementationS-money: virtual tokens for a relativistic economyOptimal symmetric ternary quantum encryption schemesQuantum to classical one-way function and its applications in quantum money authenticationQuantum games: a review of the history, current state, and interpretationNew public-key quantum signature scheme with quantum one-way functionOptimal Reductions Between Oblivious Transfers Using Interactive HashingInformation-Theoretic Conditions for Two-Party Secure Function EvaluationQuantization of games: towards quantum artificial intelligenceOT-Combiners via Secure ComputationPhotonic Realization of Quantum Information ProtocolsSeparable states improve protocols with finite randomnessSecure software leasingOblivious transfer is in MiniQCryptClassical proofs of quantum knowledgeQuantum secure direct communication with mutual authentication using a single basisNo-clone smartcard via quantum memoryQuantum watermarking algorithm based on chaotic affine scramblingNew constructions for quantum money and its application``The simplest protocol for oblivious transfer revisitedStatistical Security Conditions for Two-Party Secure Function EvaluationOblivious Transfer Based on the McEliece AssumptionsWhy quantum bit commitment and ideal quantum coin tossing are impossible.Quantum model of computations: Underlying principles and achievements\(n\rightarrow 1\) quantum random access codes using single 3-level systems




This page was built for publication: