4.6 Article

Symmetrically private information retrieval based on blind quantum computing

Related references

Note: Only part of the references are listed.
Article Physics, Multidisciplinary

Experimental verification of quantum computation

Stefanie Barz et al.

NATURE PHYSICS (2013)

Article Optics

Blind quantum computation protocol in which Alice only makes measurements

Tomoyuki Morimae et al.

PHYSICAL REVIEW A (2013)

Article Computer Science, Information Systems

Unconditional Security From Noisy Quantum Storage

Robert Koenig et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2012)

Article Physics, Multidisciplinary

Cryptography from noisy storage

Stephanie Wehner et al.

PHYSICAL REVIEW LETTERS (2008)

Article Computer Science, Theory & Methods

Cryptography in the bounded-quantum-storage model

Ivan B. Damgard et al.

SIAM JOURNAL ON COMPUTING (2008)

Article Physics, Multidisciplinary

A one-way quantum computer

R Raussendorf et al.

PHYSICAL REVIEW LETTERS (2001)

Article Physics, Multidisciplinary

Simple proof of security of the BB84 quantum key distribution protocol

PW Shor et al.

PHYSICAL REVIEW LETTERS (2000)