Pseudorandomness with proof of destruction and applications
From MaRDI portal
Publication:6587948
DOI10.1007/978-3-031-48624-1_5MaRDI QIDQ6587948FDOQ6587948
Amit Behera, Or Sattath, Omri Shmueli, Zvika Brakerski
Publication date: 15 August 2024
Cryptography (94A60) Quantum information, communication, networks (quantum-theoretic aspects) (81P45) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Title not available (Why is that?)
- Optimal Counterfeiting Attacks and Generalizations for Wiesner’s Quantum Money
- Foundations of Cryptography
- Theory of Cryptography
- Cryptography from pseudorandom quantum states
- Pseudorandom quantum states
- (Pseudo) random quantum states with binary phase
- One-shot signatures and applications to hybrid quantum/classical authentication
- Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions
- Semi-quantum money
- Scalable pseudorandom quantum states
- One-way functions imply secure computation in a quantum world
- Computational Pseudorandomness, the Wormhole Growth Paradox, and Constraints on the AdS/CFT Duality (Abstract)
- Quantum commitments and signatures without one-way functions
- Hidden cosets and applications to unclonable cryptography
- Public-key Quantum money with a classical bank
- Semi-quantum tokenized signatures
- Pseudorandom (function-Like) quantum state generators: new definitions and applications
Cited In (1)
This page was built for publication: Pseudorandomness with proof of destruction and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6587948)