scientific article; zbMATH DE number 3825698
From MaRDI portal
Publication:3671875
zbMATH Open0521.94003MaRDI QIDQ3671875FDOQ3671875
Authors: Stephen J. Wiesner
Publication date: 1983
Title of this publication is not available (Why is that?)
Cited In (only showing first 100 items - show all)
- Semi-quantum money
- Two instances of random access code in the quantum regime
- \(n\rightarrow 1\) quantum random access codes using single 3-level systems
- Another round of breaking and making quantum money: how to not build it from lattices, and more
- Public key encryption with secure key leasing
- Measurement device-independent quantum secure direct communication with user authentication
- A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
- Oblivious transfer from zero-knowledge proofs. Or how to achieve round-optimal quantum oblivious transfer and zero-knowledge proofs on quantum states
- On the (im)plausibility of public-key quantum money from collision-resistant hash functions
- Improved multiparty quantum private comparison based on quantum homomorphic encryption
- Long term confidentiality: a survey
- Hidden cosets and applications to unclonable cryptography
- Quantum public-key encryption schemes based on conjugate coding
- Franchised quantum money
- Public-key encryption with quantum keys
- Revocable cryptography from learning with errors
- Semi-quantum copy-protection and more
- Semiquantum key distribution using initial states in only one basis without the classical user measuring
- Secure software leasing without assumptions
- Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer
- Physical Limitations of Quantum Cryptographic Primitives or Optimal Bounds for Quantum Coin Flipping and Bit Commitment
- Quantum private comparison protocol based on 4D GHZ-like states
- A new framework for quantum oblivious transfer
- Optimal Reductions Between Oblivious Transfers Using Interactive Hashing
- S-money: virtual tokens for a relativistic economy
- Game-theoretic perspective of Ping-Pong protocol
- On the complete description of entangled systems. I: Exploring hidden variables and context communication cost in simulating quantum correlations
- Collusion resistant copy-protection for watermarkable functionalities
- Misdirection steganography
- Cloning games: a general framework for unclonable primitives
- Cryptography with certified deletion
- Publicly-verifiable deletion via target-collapsing functions
- Probabilistic versions of quantum private queries
- Computational quantum key distribution (CQKD) on decentralized ledger and blockchain
- Cryptanalysis of three quantum money schemes
- Transferable quantum cheque scheme based on quantum public-key cryptography
- Software with certified deletion
- Comment on ``Quantum identity authentication with single photon
- Nonlocal correlations and noise in different settings of a two-player game
- A review of quantum and hybrid quantum/classical blockchain protocols
- Heralded hyper-CNOT gates for two-photon systems assisted by quantum scattering in waveguides
- Random access test as an identifier of nonclassicality*
- Implementation of an E-payment security evaluation system based on quantum blind computing
- Unclonable encryption, revisited
- A modular approach to unclonable cryptography
- How (not) to build quantum PKE in Minicrypt
- Quantum cryptographic protocols with dual messaging system via 2D alternate quantum walk of a genuine single-photon entangled state
- Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication
- Expanding the sharpness parameter area based on sequential \(3 \rightarrow 1\) parity-oblivious quantum random access code
- Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness
- On the feasibility of unclonable encryption, and more
- Dynamic full quantum one-way function based on quantum circuit mapping
- Hierarchical quantum information splitting of an arbitrary \(m\)-qudit state with multiparty
- A review of quantum correlation sharing: the recycling of quantum correlations triggered by quantum measurements
- Practical efficient 1-out-of-n quantum oblivious transfer protocol
- New constructions for quantum money and its application
- Quantum contracts between Schrödinger and a cat
- Role of Steering Inequality in Quantum Key Distribution Protocol
- Study of potential games using Ising interaction
- One-out-of-many unclonable cryptography: definitions, constructions, and more
- Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions
- Efficient, actively secure MPC with a dishonest majority: a survey
- Quantum model of computations: Underlying principles and achievements
- A search for quantum coin-flipping protocols using optimization techniques
- Composable Security in the Bounded-Quantum-Storage Model
- Quantum to classical one-way function and its applications in quantum money authentication
- Computational Security of Quantum Encryption
- Revisiting ``The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution
- Oblivious transfer and quantum channels as communication resources
- Experimental realization of quantum cheque using a five-qubit quantum computer
- The population inversion and the entropy of a moving two-level atom in interaction with a quantized field
- Why protective measurement does not establish the reality of the quantum state
- Quantum games: a review of the history, current state, and interpretation
- The statistical fluctuation study of quantum key distribution in means of uncertainty principle
- Quantization of games: towards quantum artificial intelligence
- The Simplest Protocol for Oblivious Transfer
- An efficient quantum somewhat homomorphic symmetric searchable encryption
- Information-Theoretic Conditions for Two-Party Secure Function Evaluation
- Controlling the key by choosing the detection bits in quantum cryptographic protocols
- Oblivious Transfer Based on the McEliece Assumptions
- Theory of quantum games and quantum economic behavior
- Splitting unknown qubit state using five-qubit entangled state
- Quantum cryptography without public announcement of bases
- Complexity of protein folding
- Minimum disclosure proofs of knowledge
- Do transitive preferences always result in indifferent divisions?
- Quantum watermarking algorithm based on chaotic affine scrambling
- Transitivity vs. Intransitivity in decision making process - an example in quantum game theory
- OT-Combiners via Secure Computation
- Cryptography from pseudorandom quantum states
- Why quantum bit commitment and ideal quantum coin tossing are impossible.
- Practical quantum bit commitment protocol
- Hierarchical quantum information splitting with eight-qubit cluster states
- Quantum key distribution without the wavefunction
- Multicharacters remote rotation sharing with five-particle cluster state
- Secret sharing of quantum information via entanglement swapping in cavity QED
- New public-key quantum signature scheme with quantum one-way function
- Authenticated semi-quantum key distributions without classical channel
- Quantum cheques
- Efficient arbitrated quantum signature and its proof of security
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3671875)