Author:
Broadbent Anne,Jeffery Stacey
Publisher
Springer Berlin Heidelberg
Reference36 articles.
1. Aharonov, D., Ben-Or, M., Eban, E.: Interactive proofs for quantum computations. In: Proceeding of Innovations in Computer Science 2010 (ICS 2010), pp. 453–469 (2010)
2. Ambainis, A., Mosca, M., Tapp, A., De Wolf, R.: Private quantum channels. In: Proceedings of the 41st Annual IEEE Symposium on Foundations of Computer Science (FOCS 2000), pp. 547–553 (2000)
3. Arrighi, P., Salvail, L.: Blind quantum computation. Int. J. Quantum Inf. 4, 883–898 (2006)
4. Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Proceedings of the Second Theory of Cryptography Conference (TCC 2005), pp. 325–341 (2005)
5. Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: Proceedings of the 52nd Annual IEEE Symposium on Foundations of Computer Science (FOCS 2011), pp. 97–106 (2011). Full version available at Cryptology ePrint Archive, Report 2011/344
Cited by
102 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献