scientific article
From MaRDI portal
Publication:3671875
zbMath0521.94003MaRDI QIDQ3671875
Publication date: 1983
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (only showing first 100 items - show all)
Franchised quantum money ⋮ Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication ⋮ A proposal for device independent probabilistic quantum oblivious transfer ⋮ A new framework for quantum oblivious transfer ⋮ On the complete description of entangled systems. I: Exploring hidden variables and context communication cost in simulating quantum correlations ⋮ Cloning games: a general framework for unclonable primitives ⋮ Publicly-verifiable deletion via target-collapsing functions ⋮ Cryptography with certified deletion ⋮ Hidden cosets and applications to unclonable cryptography ⋮ Oblivious transfer and quantum channels as communication resources ⋮ Computational quantum key distribution (CQKD) on decentralized ledger and blockchain ⋮ The population inversion and the entropy of a moving two-level atom in interaction with a quantized field ⋮ Why protective measurement does not establish the reality of the quantum state ⋮ Splitting unknown qubit state using five-qubit entangled state ⋮ Controlling the key by choosing the detection bits in quantum cryptographic protocols ⋮ Do transitive preferences always result in indifferent divisions? ⋮ Random access test as an identifier of nonclassicality* ⋮ Quantum Cryptography over Underground Optical Fibers ⋮ Game-theoretic perspective of Ping-Pong protocol ⋮ Authenticated semi-quantum key distributions without classical channel ⋮ Quantum cheques ⋮ Misdirection steganography ⋮ Study of potential games using Ising interaction ⋮ Minimum disclosure proofs of knowledge ⋮ Transferable quantum cheque scheme based on quantum public-key cryptography ⋮ Efficient arbitrated quantum signature and its proof of security ⋮ Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions ⋮ Semi-quantum money ⋮ The Simplest Protocol for Oblivious Transfer ⋮ Quantum cryptography without public announcement of bases ⋮ Cryptanalysis of three quantum money schemes ⋮ A review of quantum and hybrid quantum/classical blockchain protocols ⋮ A generic quantum protocol for one-sided secure two-party classical computations ⋮ Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer ⋮ Nonlocal correlations and noise in different settings of a two-player game ⋮ Computational Security of Quantum Encryption ⋮ Dynamic full quantum one-way function based on quantum circuit mapping ⋮ Physical Limitations of Quantum Cryptographic Primitives or Optimal Bounds for Quantum Coin Flipping and Bit Commitment ⋮ Multicharacters remote rotation sharing with five-particle cluster state ⋮ Cryptography from pseudorandom quantum states ⋮ Source-device-independent randomness expansion using quantum random access codes ⋮ Expanding the sharpness parameter area based on sequential \(3 \rightarrow 1\) parity-oblivious quantum random access code ⋮ On the feasibility of unclonable encryption, and more ⋮ Quantum private comparison protocol based on 4D GHZ-like states ⋮ Hierarchical quantum information splitting of an arbitrary \(m\)-qudit state with multiparty ⋮ Role of Steering Inequality in Quantum Key Distribution Protocol ⋮ Collusion resistant copy-protection for watermarkable functionalities ⋮ Improved multiparty quantum private comparison based on quantum homomorphic encryption ⋮ Quantum public-key encryption schemes based on conjugate coding ⋮ Public key encryption with secure key leasing ⋮ Another round of breaking and making quantum money: how to not build it from lattices, and more ⋮ Quantum contracts between Schrödinger and a cat ⋮ Experimental realization of quantum cheque using a five-qubit quantum computer ⋮ Quantum key distribution without the wavefunction ⋮ Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness ⋮ Practical efficient 1-out-of-n quantum oblivious transfer protocol ⋮ Quantum money with mintage supervision ⋮ Quantum cryptography beyond quantum key distribution ⋮ Composable Security in the Bounded-Quantum-Storage Model ⋮ Secure software leasing without assumptions ⋮ Unclonable encryption, revisited ⋮ An efficient quantum somewhat homomorphic symmetric searchable encryption ⋮ Hierarchical quantum information splitting with eight-qubit cluster states ⋮ Cryptanalysis of a new circular quantum secret sharing protocol for remote agents ⋮ Implementation of an E-payment security evaluation system based on quantum blind computing ⋮ Practical quantum bit commitment protocol ⋮ Revisiting ``The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution ⋮ Transitivity vs. Intransitivity in decision making process - an example in quantum game theory ⋮ Long term confidentiality: a survey ⋮ Secret sharing of quantum information via entanglement swapping in cavity QED ⋮ Using quantum key distribution for cryptographic purposes: a survey ⋮ Non-contextual chocolate balls versus value indefinite quantum cryptography ⋮ Efficient, actively secure MPC with a dishonest majority: a survey ⋮ Quantum identity authentication without entanglement ⋮ The statistical fluctuation study of quantum key distribution in means of uncertainty principle ⋮ Quantum oblivious transfer: a secure practical implementation ⋮ S-money: virtual tokens for a relativistic economy ⋮ Optimal symmetric ternary quantum encryption schemes ⋮ Quantum to classical one-way function and its applications in quantum money authentication ⋮ Quantum games: a review of the history, current state, and interpretation ⋮ New public-key quantum signature scheme with quantum one-way function ⋮ Optimal Reductions Between Oblivious Transfers Using Interactive Hashing ⋮ Information-Theoretic Conditions for Two-Party Secure Function Evaluation ⋮ Quantization of games: towards quantum artificial intelligence ⋮ OT-Combiners via Secure Computation ⋮ Photonic Realization of Quantum Information Protocols ⋮ Separable states improve protocols with finite randomness ⋮ Secure software leasing ⋮ Oblivious transfer is in MiniQCrypt ⋮ Classical proofs of quantum knowledge ⋮ Quantum secure direct communication with mutual authentication using a single basis ⋮ No-clone smartcard via quantum memory ⋮ Quantum watermarking algorithm based on chaotic affine scrambling ⋮ New constructions for quantum money and its application ⋮ ``The simplest protocol for oblivious transfer revisited ⋮ Statistical Security Conditions for Two-Party Secure Function Evaluation ⋮ Oblivious Transfer Based on the McEliece Assumptions ⋮ Why quantum bit commitment and ideal quantum coin tossing are impossible. ⋮ Quantum model of computations: Underlying principles and achievements ⋮ \(n\rightarrow 1\) quantum random access codes using single 3-level systems
This page was built for publication: