Author:
Raina Priya,Kaushal Sakshi
Reference17 articles.
1. Alléaume, R., Branciard, C., Bouda, J., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., Länger, T., Lütkenhaus, N., et al.: Using quantum key distribution for cryptographic purposes: a survey. Theor. Comput. Sci. 560, 62–81 (2014)
2. Barz, S., Kashefi, E., Broadbent, A., Fitzsimons, J.F., Zeilinger, A., Walther, P.: Demonstration of blind quantum computing. Science 335(6066), 303–308 (2012)
3. Bennett, C.H., Brassard, G., Ekert, A.K.: Quantum cryptography. Sci. Am. 267(4), 50–57 (1992)
4. Broadbent, A., Fitzsimons, J., Kashefi, E.: Measurement-based and universal blind quantum computation. In: Formal Methods for Quantitative Aspects of Programming Languages, pp. 43–86. Springer (2010)
5. Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: Proceedings. 42nd IEEE Symposium on Foundations of Computer Science, 2001, pp. 136–145. IEEE (2001)