Author:
Zhao Liang-Yuan,Yin Zhen-Qiang,Chen Wei,Qian Yong-Jun,Zhang Chun-Mei,Guo Guang-Can,Han Zheng-Fu
Publisher
Springer Science and Business Media LLC
Reference44 articles.
1. Gertner, Y., Ishai, Y., Kushilevitz, E. & Malkin, T. Protecting data privacy in private information retrieval schemes. Journal of Computer and System Sciences 60, 592–629 (2000).
2. Rabin, M. O. How to exchange secrets with oblivious transfer. Technical Report TR-81, Aiken Computation Lab, Harvard University (1981).
3. Lo, H.-K. Insecurity of quantum secure computations. Physical Review A 56, 1154 (1997).
4. Einstein, A., Podolsky, B. & Rosen, N. Can quantum-mechanical description of physical reality be considered complete? Physical Review 47, 777–780 (1935).
5. Kerenidis, I. & De Wolf, R. Quantum symmetrically-private information retrieval. Information Processing Letters 90, 109–114 (2004).
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献