Actively Secure Two-Party Evaluation of Any Quantum Operation
From MaRDI portal
Publication:2914301
DOI10.1007/978-3-642-32009-5_46zbMath1296.94110OpenAlexW1258980855MaRDI QIDQ2914301
Jesper Buus Nielsen, Louis Salvail, Frédéric Dupuis
Publication date: 25 September 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_46
Related Items (20)
On the round complexity of secure quantum computation ⋮ Round efficient secure multiparty quantum computation with identifiable abort ⋮ One-way functions imply secure computation in a quantum world ⋮ Constant-round blind classical verification of quantum sampling ⋮ Block encryption of quantum messages ⋮ Computational Security of Quantum Encryption ⋮ Efficient Simulation for Quantum Message Authentication ⋮ On concurrent multi-party quantum computation ⋮ Public verifiable measurement-only blind quantum computation based on entanglement witnesses ⋮ Quantum cryptography beyond quantum key distribution ⋮ Secure quantum computation with classical communication ⋮ Secure software leasing without assumptions ⋮ Rate-1 quantum fully homomorphic encryption ⋮ Unnamed Item ⋮ Symmetric quantum fully homomorphic encryption with perfect security ⋮ Robustness and device independence of verifiable blind quantum computing ⋮ Secure multi-party quantum computation with a dishonest majority ⋮ Post-quantum multi-party computation ⋮ Oblivious transfer is in MiniQCrypt ⋮ Quantum Authentication with Key Recycling
This page was built for publication: Actively Secure Two-Party Evaluation of Any Quantum Operation