-
1
-
-
0000486090
-
On the Einstein-Podolsky-Rosen paradox
-
Bell, J. S. 1965 On the Einstein-Podolsky-Rosen paradox. Physics 1, 195-200.
-
(1965)
Physics
, vol.1
, pp. 195-200
-
-
Bell, J.S.1
-
2
-
-
33750407817
-
-
See
-
Brassard, G., Buhrman, H., Linden, N., Methot, A., Tapp, A. & Unger, F. 2005 A limit on non-locality in any world in which communication complexity is not trivial. See http://arxiv.org/ abs/quant-ph/0508042.
-
(2005)
A Limit on Non-locality in Any World in Which Communication Complexity Is Not Trivial
-
-
Brassard, G.1
Buhrman, H.2
Linden, N.3
Methot, A.4
Tapp, A.5
Unger, F.6
-
3
-
-
34250250611
-
Quantum generalizations of Bell's inequality
-
doi:10.1007/BF00417500
-
Cirel'son, B. 1980 Quantum generalizations of Bell's inequality. Lett. Math. Phys. 4, 93-100. (doi:10.1007/BF00417500)
-
(1980)
Lett. Math. Phys.
, vol.4
, pp. 93-100
-
-
Cirel'son, B.1
-
4
-
-
36049056258
-
Proposed experiment to test local hidden-variable theories
-
doi:10.1103/PhysRevLett.23.880
-
Clauser, J., Horne, M., Shimony, A. & Holt, R. 1969 Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, 880-884. (doi:10.1103/PhysRevLett.23.880)
-
(1969)
Phys. Rev. Lett.
, vol.23
, pp. 880-884
-
-
Clauser, J.1
Horne, M.2
Shimony, A.3
Holt, R.4
-
5
-
-
85030121757
-
Equivalence between two flavours of oblivious transfers
-
Crépeau, C. 1987 Equivalence between two flavours of oblivious transfers. Proc. CRYPTO-advances in cryptology, pp. 350-354.
-
(1987)
Proc. CRYPTO-advances in Cryptology
, pp. 350-354
-
-
Crépeau, C.1
-
6
-
-
84946290541
-
Quantum oblivious transfer
-
Crépeau, C. 1994 Quantum oblivious transfer. J. Mod. Opt. 41, 2455-2466.
-
(1994)
J. Mod. Opt.
, vol.41
, pp. 2455-2466
-
-
Crépeau, C.1
-
7
-
-
0024132071
-
Achieving oblivious transfer using weakened security assumptions
-
Crépeau, C. & Kilian, J. 1988 Achieving oblivious transfer using weakened security assumptions. Proc. 29th IEEE FOCS, pp. 42-52.
-
(1988)
Proc. 29th IEEE FOCS
, pp. 42-52
-
-
Crépeau, C.1
Kilian, J.2
-
8
-
-
0022080529
-
A randomized protocol for signing contracts
-
doi:10.1145/3812.3818
-
Even, S., Goldreich, O. & Lempel, A. 1985 A randomized protocol for signing contracts. Commun. ACM 28, 637-647. (doi:10.1145/3812.3818)
-
(1985)
Commun. ACM
, vol.28
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
10
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
Hoeffding, W. 1963 Probability inequalities for sums of bounded random variables. J. Am. Stat. Assoc. 58, 13-30.
-
(1963)
J. Am. Stat. Assoc.
, vol.58
, pp. 13-30
-
-
Hoeffding, W.1
-
11
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
Kilian, J. 1988 Founding cryptography on oblivious transfer. Proc. 20th ACM STOC, pp 20-31.
-
(1988)
Proc. 20th ACM STOC
, pp. 20-31
-
-
Kilian, J.1
-
12
-
-
0033706604
-
More general completeness theorems for secure two-party computation
-
Kilian, J. 2000 More general completeness theorems for secure two-party computation. Proc. 32nd ACM STOC, pp. 316-324.
-
(2000)
Proc. 32nd ACM STOC
, pp. 316-324
-
-
Kilian, J.1
-
13
-
-
0001236013
-
Insecurity of quantum secure computations
-
doi:10.1103/PhysRevA.56.1154
-
Lo, H.-K. 1997 Insecurity of quantum secure computations. Phys. Rev. A 56, 1154. (doi:10.1103/PhysRevA.56.1154)
-
(1997)
Phys. Rev. A
, vol.56
, pp. 1154
-
-
Lo, H.-K.1
-
14
-
-
0001260566
-
Is quantum bit commitment really possible?
-
doi:10.1103/PhysRevLett.78.3410
-
Lo, H.-K. & Chau, H. F. 1997 Is quantum bit commitment really possible? Phys. Rev. Lett. 78, 3410. (doi:10.1103/PhysRevLett.78.3410)
-
(1997)
Phys. Rev. Lett.
, vol.78
, pp. 3410
-
-
Lo, H.-K.1
Chau, H.F.2
-
15
-
-
0001731260
-
Why quantum bit commitment and ideal quantum coin tossing are impossible
-
Lo, H.-K. & Chau, H. 1998 Why quantum bit commitment and ideal quantum coin tossing are impossible. Proc. PhysComp98, pp. 177-187.
-
(1998)
Proc. PhysComp98
, pp. 177-187
-
-
Lo, H.-K.1
Chau, H.2
-
17
-
-
0001336918
-
Unconditionally secure quantum bit commitment is impossible
-
doi:10.1103/PhysRevLett.78.3414
-
Mayers, D. 1997 Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett. 78, 3414-3417. (doi:10.1103/PhysRevLett.78.3414)
-
(1997)
Phys. Rev. Lett.
, vol.78
, pp. 3414-3417
-
-
Mayers, D.1
-
18
-
-
21344488159
-
Quantum nonlocality as an axiom
-
doi:10.1007/BF02058098
-
Popescu, S. & Rohrlich, D. 1994 Quantum nonlocality as an axiom. Found. Phys. 24, 379-385. (doi:10.1007/BF02058098)
-
(1994)
Found. Phys.
, vol.24
, pp. 379-385
-
-
Popescu, S.1
Rohrlich, D.2
-
19
-
-
33745607069
-
Nonlocality as an axiom for quantum theory
-
(ed. A. Mann & M. Revzen), ch. 16. Annals of the Israel Physical Society. Haifa: Israel Physical Society
-
Popescu, S. & Rohrlich, D. 1996 Nonlocality as an axiom for quantum theory. In The dilemma of Einstein, Podolsky and Rosen, 60 years later: Int. Symp. in honour of Nathan Rosen (ed. A. Mann & M. Revzen), ch. 16. Annals of the Israel Physical Society, vol. 12. Haifa: Israel Physical Society.
-
(1996)
The Dilemma of Einstein, Podolsky and Rosen, 60 Years Later: Int. Symp. in Honour of Nathan Rosen
, vol.12
-
-
Popescu, S.1
Rohrlich, D.2
-
20
-
-
33749430183
-
Causality and nonlocality as axioms for quantum mechanics
-
Popescu, S. & Rohrlich, D. 1997 Causality and nonlocality as axioms for quantum mechanics. In Proc. Symp. of Causality and Locality in Modern Physics and Astronomy: open questions and possible solutions, York University, Toronto, 25-29 August 1997.
-
(1997)
Proc. Symp. of Causality and Locality in Modern Physics and Astronomy: Open Questions and Possible Solutions, York University, Toronto, 25-29 August 1997
-
-
Popescu, S.1
Rohrlich, D.2
-
21
-
-
0003462641
-
-
Technical report, Aiken Computer Laboratory, Harvard University, Technical report TR-81
-
Rabin, M. 1981 How to exchange secrets by oblivious transfer. Technical report, Aiken Computer Laboratory, Harvard University, Technical report TR-81.
-
(1981)
How to Exchange Secrets by Oblivious Transfer
-
-
Rabin, M.1
-
25
-
-
0001998264
-
Conjugate coding
-
doi:10.1145/1008908.1008920
-
Wiesner, S. 1983 Conjugate coding. Sigact News 15, 78-88. (doi:10.1145/1008908.1008920)
-
(1983)
Sigact News
, vol.15
, pp. 78-88
-
-
Wiesner, S.1
|