Pseudorandomness with proof of destruction and applications
From MaRDI portal
Publication:6587948
Cites work
- scientific article; zbMATH DE number 7701522 (Why is no real title available?)
- (Pseudo) random quantum states with binary phase
- Computational Pseudorandomness, the Wormhole Growth Paradox, and Constraints on the AdS/CFT Duality (Abstract)
- Cryptography from pseudorandom quantum states
- Foundations of Cryptography
- Hidden cosets and applications to unclonable cryptography
- One-shot signatures and applications to hybrid quantum/classical authentication
- One-way functions imply secure computation in a quantum world
- Optimal counterfeiting attacks and generalizations for Wiesner's quantum money
- Pseudorandom (function-Like) quantum state generators: new definitions and applications
- Pseudorandom quantum states
- Public-key Quantum money with a classical bank
- Quantum commitments and signatures without one-way functions
- Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions
- Scalable pseudorandom quantum states
- Semi-quantum money
- Semi-quantum tokenized signatures
- Theory of Cryptography
This page was built for publication: Pseudorandomness with proof of destruction and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6587948)