메뉴 건너뛰기




Volumn 462, Issue 2071, 2006, Pages 1919-1932

Implications of superstrong non-locality for cryptography

Author keywords

Cryptography; Non local boxes; Non locality

Indexed keywords


EID: 33845541381     PISSN: 13645021     EISSN: 14712946     Source Type: Journal    
DOI: 10.1098/rspa.2006.1663     Document Type: Article
Times cited : (45)

References (26)
  • 1
    • 0000486090 scopus 로고
    • On the Einstein-Podolsky-Rosen paradox
    • Bell, J. S. 1965 On the Einstein-Podolsky-Rosen paradox. Physics 1, 195-200.
    • (1965) Physics , vol.1 , pp. 195-200
    • Bell, J.S.1
  • 3
    • 34250250611 scopus 로고
    • Quantum generalizations of Bell's inequality
    • doi:10.1007/BF00417500
    • Cirel'son, B. 1980 Quantum generalizations of Bell's inequality. Lett. Math. Phys. 4, 93-100. (doi:10.1007/BF00417500)
    • (1980) Lett. Math. Phys. , vol.4 , pp. 93-100
    • Cirel'son, B.1
  • 4
    • 36049056258 scopus 로고
    • Proposed experiment to test local hidden-variable theories
    • doi:10.1103/PhysRevLett.23.880
    • Clauser, J., Horne, M., Shimony, A. & Holt, R. 1969 Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, 880-884. (doi:10.1103/PhysRevLett.23.880)
    • (1969) Phys. Rev. Lett. , vol.23 , pp. 880-884
    • Clauser, J.1    Horne, M.2    Shimony, A.3    Holt, R.4
  • 5
    • 85030121757 scopus 로고
    • Equivalence between two flavours of oblivious transfers
    • Crépeau, C. 1987 Equivalence between two flavours of oblivious transfers. Proc. CRYPTO-advances in cryptology, pp. 350-354.
    • (1987) Proc. CRYPTO-advances in Cryptology , pp. 350-354
    • Crépeau, C.1
  • 6
    • 84946290541 scopus 로고
    • Quantum oblivious transfer
    • Crépeau, C. 1994 Quantum oblivious transfer. J. Mod. Opt. 41, 2455-2466.
    • (1994) J. Mod. Opt. , vol.41 , pp. 2455-2466
    • Crépeau, C.1
  • 7
    • 0024132071 scopus 로고
    • Achieving oblivious transfer using weakened security assumptions
    • Crépeau, C. & Kilian, J. 1988 Achieving oblivious transfer using weakened security assumptions. Proc. 29th IEEE FOCS, pp. 42-52.
    • (1988) Proc. 29th IEEE FOCS , pp. 42-52
    • Crépeau, C.1    Kilian, J.2
  • 8
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • doi:10.1145/3812.3818
    • Even, S., Goldreich, O. & Lempel, A. 1985 A randomized protocol for signing contracts. Commun. ACM 28, 637-647. (doi:10.1145/3812.3818)
    • (1985) Commun. ACM , vol.28 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 10
    • 84947403595 scopus 로고
    • Probability inequalities for sums of bounded random variables
    • Hoeffding, W. 1963 Probability inequalities for sums of bounded random variables. J. Am. Stat. Assoc. 58, 13-30.
    • (1963) J. Am. Stat. Assoc. , vol.58 , pp. 13-30
    • Hoeffding, W.1
  • 11
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • Kilian, J. 1988 Founding cryptography on oblivious transfer. Proc. 20th ACM STOC, pp 20-31.
    • (1988) Proc. 20th ACM STOC , pp. 20-31
    • Kilian, J.1
  • 12
    • 0033706604 scopus 로고    scopus 로고
    • More general completeness theorems for secure two-party computation
    • Kilian, J. 2000 More general completeness theorems for secure two-party computation. Proc. 32nd ACM STOC, pp. 316-324.
    • (2000) Proc. 32nd ACM STOC , pp. 316-324
    • Kilian, J.1
  • 13
    • 0001236013 scopus 로고    scopus 로고
    • Insecurity of quantum secure computations
    • doi:10.1103/PhysRevA.56.1154
    • Lo, H.-K. 1997 Insecurity of quantum secure computations. Phys. Rev. A 56, 1154. (doi:10.1103/PhysRevA.56.1154)
    • (1997) Phys. Rev. A , vol.56 , pp. 1154
    • Lo, H.-K.1
  • 14
    • 0001260566 scopus 로고    scopus 로고
    • Is quantum bit commitment really possible?
    • doi:10.1103/PhysRevLett.78.3410
    • Lo, H.-K. & Chau, H. F. 1997 Is quantum bit commitment really possible? Phys. Rev. Lett. 78, 3410. (doi:10.1103/PhysRevLett.78.3410)
    • (1997) Phys. Rev. Lett. , vol.78 , pp. 3410
    • Lo, H.-K.1    Chau, H.F.2
  • 15
    • 0001731260 scopus 로고    scopus 로고
    • Why quantum bit commitment and ideal quantum coin tossing are impossible
    • Lo, H.-K. & Chau, H. 1998 Why quantum bit commitment and ideal quantum coin tossing are impossible. Proc. PhysComp98, pp. 177-187.
    • (1998) Proc. PhysComp98 , pp. 177-187
    • Lo, H.-K.1    Chau, H.2
  • 17
    • 0001336918 scopus 로고    scopus 로고
    • Unconditionally secure quantum bit commitment is impossible
    • doi:10.1103/PhysRevLett.78.3414
    • Mayers, D. 1997 Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett. 78, 3414-3417. (doi:10.1103/PhysRevLett.78.3414)
    • (1997) Phys. Rev. Lett. , vol.78 , pp. 3414-3417
    • Mayers, D.1
  • 18
    • 21344488159 scopus 로고
    • Quantum nonlocality as an axiom
    • doi:10.1007/BF02058098
    • Popescu, S. & Rohrlich, D. 1994 Quantum nonlocality as an axiom. Found. Phys. 24, 379-385. (doi:10.1007/BF02058098)
    • (1994) Found. Phys. , vol.24 , pp. 379-385
    • Popescu, S.1    Rohrlich, D.2
  • 21
    • 0003462641 scopus 로고
    • Technical report, Aiken Computer Laboratory, Harvard University, Technical report TR-81
    • Rabin, M. 1981 How to exchange secrets by oblivious transfer. Technical report, Aiken Computer Laboratory, Harvard University, Technical report TR-81.
    • (1981) How to Exchange Secrets by Oblivious Transfer
    • Rabin, M.1
  • 25
    • 0001998264 scopus 로고
    • Conjugate coding
    • doi:10.1145/1008908.1008920
    • Wiesner, S. 1983 Conjugate coding. Sigact News 15, 78-88. (doi:10.1145/1008908.1008920)
    • (1983) Sigact News , vol.15 , pp. 78-88
    • Wiesner, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.