-
1
-
-
38149107872
-
Secure multi-party quantum computation with (only) a strict honest majority
-
IEEE Computer Society, Los Alamitos
-
Ben-Or, M., Crépeau, C., Gottesman, D., Hassidim, A., Smith, A.: Secure multi-party quantum computation with (only) a strict honest majority. In: FOCS 2006, pp. 249-260. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
FOCS 2006
, pp. 249-260
-
-
Ben-Or, M.1
Crépeau, C.2
Gottesman, D.3
Hassidim, A.4
Smith, A.5
-
2
-
-
24144445587
-
The universal composable security of quantum key distribution
-
Kilian, J. (ed.) TCC 2005. Springer, Heidelberg Preprint at arXiv:quant-ph/0409078v1
-
Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 386-406. Springer, Heidelberg (2005); Preprint at arXiv:quant-ph/0409078v1
-
(2005)
LNCS
, vol.3378
, pp. 386-406
-
-
Ben-Or, M.1
Horodecki, M.2
Leung, D.W.3
Mayers, D.4
Oppenheim, J.5
-
4
-
-
0003259517
-
Quantum cryptography: Public-key distribution and coin tossing
-
IEEE Computer Society, Los Alamitos
-
Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing 1984, pp. 175-179. IEEE Computer Society, Los Alamitos (1984)
-
(1984)
IEEE International Conference on Computers, Systems and Signal Processing 1984
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
5
-
-
84969361843
-
Practical quantum oblivious transfer
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Bennett, C.H., Brassard, G., Crépeau, C., Skubiszewska, M.-H.: Practical quantum oblivious transfer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 351-366. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, M.-H.4
-
6
-
-
0027803208
-
A quantum bit commitment scheme provably unbreakable by both parties
-
IEEE Computer Society, Los Alamitos
-
Brassard, G., Crépeau, C., Jozsa, R., Langlois, D.: A quantum bit commitment scheme provably unbreakable by both parties. In: FOCS 1993, Los Alamitos, CA, USA, pp. 362-371. IEEE Computer Society, Los Alamitos (1993)
-
(1993)
FOCS 1993, Los Alamitos, CA, USA
, pp. 362-371
-
-
Brassard, G.1
Crépeau, C.2
Jozsa, R.3
Langlois, D.4
-
7
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE Computer Society, Los Alamitos Full and revised version is IACR ePrint 2000/067
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS 2001, pp. 136-145. IEEE Computer Society, Los Alamitos (2001); Full and revised version is IACR ePrint 2000/067
-
(2001)
FOCS 2001
, pp. 136-145
-
-
Canetti, R.1
-
8
-
-
84880897758
-
Universally composable commitments
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg Full version is IACR ePrint 2001/055
-
Canetti, R., Fischlin, M.: Universally composable commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19-40. Springer, Heidelberg (2001); Full version is IACR ePrint 2001/055
-
(2001)
LNCS
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
9
-
-
70350347114
-
Improving the security of quantum protocols
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Damgård, I., Fehr, S., Lunemann, C., Salvail, L., Schaffner, C.: Improving the security of quantum protocols. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 408-427. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 408-427
-
-
Damgård, I.1
Fehr, S.2
Lunemann, C.3
Salvail, L.4
Schaffner, C.5
-
10
-
-
33748633496
-
Cryptography in the bounded quantum-storage model
-
Full version is arXiv:quant-ph/0508222v2
-
Damgård, I., Fehr, S., Salvail, L., Schaffner, C.: Cryptography in the bounded quantum-storage model. In: FOCS 2005, pp. 449-458 (2005); Full version is arXiv:quant-ph/0508222v2
-
(2005)
FOCS 2005
, pp. 449-458
-
-
Damgård, I.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
11
-
-
70350273695
-
Composing quantum protocols in a classical environment
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Fehr, S., Schaffner, C.: Composing quantum protocols in a classical environment. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 350-367. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 350-367
-
-
Fehr, S.1
Schaffner, C.2
-
12
-
-
77954626949
-
A paradox of quantum universal composability
-
poster
-
Hofheinz, D., Müller-Quade, J.: A paradox of quantum universal composability. In: 4th European QIPC Workshop, poster (2003), http://www.quiprocone.org/Hot%20Topics%20posters/muellerquade-poster.pdf
-
(2003)
4th European QIPC Workshop
-
-
Hofheinz, D.1
Müller-Quade, J.2
-
13
-
-
51849102397
-
Founding cryptography on oblivious transfer - Efficiently
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer - efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 572-591
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
14
-
-
0000596367
-
Unconditionally secure bit commitment
-
Kent, A.: Unconditionally secure bit commitment. PRL 83(7), 1447-1450 (1999)
-
(1999)
PRL
, vol.83
, Issue.7
, pp. 1447-1450
-
-
Kent, A.1
-
15
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
ACM Press, New York
-
Kilian, J.: Founding cryptography on oblivious transfer. In: STOC 1988, pp. 20-31. ACM Press, New York (1988)
-
(1988)
STOC 1988
, pp. 20-31
-
-
Kilian, J.1
-
16
-
-
0001336918
-
Unconditionally Secure Quantum Bit Commitment is Impossible
-
Preprint at arXiv:quantph/9605044v2
-
Mayers, D.: Unconditionally Secure Quantum Bit Commitment is Impossible. Physical Review Letters 78(17), 3414-3417 (1997); Preprint at arXiv:quantph/9605044v2
-
(1997)
Physical Review Letters
, vol.78
, Issue.17
, pp. 3414-3417
-
-
Mayers, D.1
-
17
-
-
38049062044
-
Long-term security and universal composability
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Müller-Quade, J., Unruh, D.: Long-term security and universal composability. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 41-60. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 41-60
-
-
Müller-Quade, J.1
Unruh, D.2
-
23
-
-
33746796200
-
Zero-knowledge against quantum attacks
-
ACM, New York
-
Watrous, J.: Zero-knowledge against quantum attacks. In: STOC 2006, pp. 296-305. ACM, New York (2006)
-
(2006)
STOC 2006
, pp. 296-305
-
-
Watrous, J.1
-
24
-
-
49049095709
-
Composable security in the bounded-quantum-storage model
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg Full version is arXiv:0709.0492v1 [quant-ph]
-
Wehner, S.,Wullschleger, J.: Composable security in the bounded-quantum-storage model. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 604-615. Springer, Heidelberg (2008); Full version is arXiv:0709.0492v1 [quant-ph]
-
(2008)
LNCS
, vol.5126
, pp. 604-615
-
-
Wehner, S.1
Wullschleger, J.2
-
25
-
-
0001998264
-
Conjugate coding
-
manuscript written ca. 1970
-
Wiesner, S.: Conjugate coding. SIGACT News 15(1), 78-88 (1983) (manuscript written ca. 1970)
-
(1983)
SIGACT News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
-
26
-
-
4243104359
-
Security of quantum protocols against coherent measurements
-
ACM, New York
-
Yao, A.C.-C.: Security of quantum protocols against coherent measurements. In: STOC 1995, pp. 67-75. ACM, New York (1995)
-
(1995)
STOC 1995
, pp. 67-75
-
-
Yao, A.C.-C.1
|