Related references
Note: Only part of the references are listed.Experimental verification of quantum computation
Stefanie Barz et al.
NATURE PHYSICS (2013)
Blind quantum computation protocol in which Alice only makes measurements
Tomoyuki Morimae et al.
PHYSICAL REVIEW A (2013)
Unconditional Security From Noisy Quantum Storage
Robert Koenig et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2012)
Flexible quantum private queries based on quantum key distribution
Fei Gao et al.
OPTICS EXPRESS (2012)
Practical private database queries based on a quantum-key-distribution protocol
Markus Jakobi et al.
PHYSICAL REVIEW A (2011)
Cryptography from noisy storage
Stephanie Wehner et al.
PHYSICAL REVIEW LETTERS (2008)
Cryptography in the bounded-quantum-storage model
Ivan B. Damgard et al.
SIAM JOURNAL ON COMPUTING (2008)
A one-way quantum computer
R Raussendorf et al.
PHYSICAL REVIEW LETTERS (2001)
Simple proof of security of the BB84 quantum key distribution protocol
PW Shor et al.
PHYSICAL REVIEW LETTERS (2000)