Author:
Zhu Dan,Wang Liwei,Zhu Hongfeng
Publisher
Springer Science and Business Media LLC
Subject
Physics and Astronomy (miscellaneous),General Mathematics
Reference16 articles.
1. Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60, 592–629 (2000)
2. Diep, D.N., Nagata, K., Wong, R.: Continuous-variable quantum computing and its applications to cryptography. Int. J. Theor. Phys. 59, 3184–3188 (2020)
3. Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100, 230502 (2008)
4. Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. Lect. Notes Comput. Sci. 3378, 386–406 (2005)
5. Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key- distribution protocol. Phys. Rev. A. 83, 022301 (2011)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献