scientific article; zbMATH DE number 3825698
From MaRDI portal
Publication:3671875
zbMATH Open0521.94003MaRDI QIDQ3671875FDOQ3671875
Publication date: 1983
Title of this publication is not available (Why is that?)
Cited In (only showing first 100 items - show all)
- Efficient, actively secure MPC with a dishonest majority: a survey
- Quantum model of computations: Underlying principles and achievements
- A search for quantum coin-flipping protocols using optimization techniques
- Composable Security in the Bounded-Quantum-Storage Model
- Quantum to classical one-way function and its applications in quantum money authentication
- Computational Security of Quantum Encryption
- Revisiting ``The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution
- Oblivious transfer and quantum channels as communication resources
- Experimental realization of quantum cheque using a five-qubit quantum computer
- The population inversion and the entropy of a moving two-level atom in interaction with a quantized field
- Why protective measurement does not establish the reality of the quantum state
- Quantum games: a review of the history, current state, and interpretation
- The statistical fluctuation study of quantum key distribution in means of uncertainty principle
- Quantization of games: towards quantum artificial intelligence
- The Simplest Protocol for Oblivious Transfer
- An efficient quantum somewhat homomorphic symmetric searchable encryption
- Information-Theoretic Conditions for Two-Party Secure Function Evaluation
- Controlling the key by choosing the detection bits in quantum cryptographic protocols
- Oblivious Transfer Based on the McEliece Assumptions
- Theory of quantum games and quantum economic behavior
- Splitting unknown qubit state using five-qubit entangled state
- Quantum cryptography without public announcement of bases
- Complexity of protein folding
- Minimum disclosure proofs of knowledge
- Do transitive preferences always result in indifferent divisions?
- Quantum watermarking algorithm based on chaotic affine scrambling
- Transitivity vs. Intransitivity in decision making process - an example in quantum game theory
- OT-Combiners via Secure Computation
- Cryptography from pseudorandom quantum states
- Why quantum bit commitment and ideal quantum coin tossing are impossible.
- Practical quantum bit commitment protocol
- Hierarchical quantum information splitting with eight-qubit cluster states
- Quantum key distribution without the wavefunction
- Multicharacters remote rotation sharing with five-particle cluster state
- Secret sharing of quantum information via entanglement swapping in cavity QED
- New public-key quantum signature scheme with quantum one-way function
- Authenticated semi-quantum key distributions without classical channel
- Quantum cheques
- Efficient arbitrated quantum signature and its proof of security
- Non-contextual chocolate balls versus value indefinite quantum cryptography
- Using quantum key distribution for cryptographic purposes: a survey
- Statistical Security Conditions for Two-Party Secure Function Evaluation
- Classical proofs of quantum knowledge
- Oblivious transfer is in MiniQCrypt
- Secure software leasing
- Quantum secure direct communication with mutual authentication using a single basis
- Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness
- Quantum identity authentication without entanglement
- Cryptanalysis of a new circular quantum secret sharing protocol for remote agents
- Quantum cryptography beyond quantum key distribution
- Quantum money with mintage supervision
- The geometry of Bloch space in the context of quantum random access codes
- Quantum Cryptography over Underground Optical Fibers
- Quantum oblivious transfer: a secure practical implementation
- ``The simplest protocol for oblivious transfer revisited
- Oblivious transfer based on single-qubit rotations
- No-clone smartcard via quantum memory
- A proposal for device independent probabilistic quantum oblivious transfer
- Separable states improve protocols with finite randomness
- A generic quantum protocol for one-sided secure two-party classical computations
- Optimal symmetric ternary quantum encryption schemes
- Photonic Realization of Quantum Information Protocols
- Source-device-independent randomness expansion using quantum random access codes
- Semi-quantum money
- Two instances of random access code in the quantum regime
- \(n\rightarrow 1\) quantum random access codes using single 3-level systems
- Another round of breaking and making quantum money: how to not build it from lattices, and more
- Public key encryption with secure key leasing
- Measurement device-independent quantum secure direct communication with user authentication
- A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
- Oblivious transfer from zero-knowledge proofs. Or how to achieve round-optimal quantum oblivious transfer and zero-knowledge proofs on quantum states
- On the (im)plausibility of public-key quantum money from collision-resistant hash functions
- Improved multiparty quantum private comparison based on quantum homomorphic encryption
- Long term confidentiality: a survey
- Hidden cosets and applications to unclonable cryptography
- Quantum public-key encryption schemes based on conjugate coding
- Franchised quantum money
- Public-key encryption with quantum keys
- Revocable cryptography from learning with errors
- Semi-quantum copy-protection and more
- Semiquantum key distribution using initial states in only one basis without the classical user measuring
- Secure software leasing without assumptions
- Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer
- Physical Limitations of Quantum Cryptographic Primitives or Optimal Bounds for Quantum Coin Flipping and Bit Commitment
- Quantum private comparison protocol based on 4D GHZ-like states
- A new framework for quantum oblivious transfer
- Optimal Reductions Between Oblivious Transfers Using Interactive Hashing
- S-money: virtual tokens for a relativistic economy
- Game-theoretic perspective of Ping-Pong protocol
- On the complete description of entangled systems. I: Exploring hidden variables and context communication cost in simulating quantum correlations
- Collusion resistant copy-protection for watermarkable functionalities
- Misdirection steganography
- Cloning games: a general framework for unclonable primitives
- Cryptography with certified deletion
- Publicly-verifiable deletion via target-collapsing functions
- Probabilistic versions of quantum private queries
- Computational quantum key distribution (CQKD) on decentralized ledger and blockchain
- Cryptanalysis of three quantum money schemes
- Transferable quantum cheque scheme based on quantum public-key cryptography
- Software with certified deletion
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3671875)