Sciweavers

515 search results - page 61 / 103
» Classically-controlled Quantum Computation
Sort
View
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
16 years 2 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
ICS
2010
Tsinghua U.
15 years 11 months ago
On the Power of a Unique Quantum Witness
Rahul Jain, Iordanis Kerenidis, Greg Kuperberg, Mi...
STACS
2007
Springer
15 years 7 months ago
Quantum Network Coding
Masahito Hayashi, Kazuo Iwama, Harumichi Nishimura...
99
Voted
PRDC
2006
IEEE
15 years 7 months ago
Quantum Oblivious Transfer and Fair Digital Transactions
Yao-Hsin Chou, I-Ming Tsai, Chien-Ming Ko, Sy-Yen ...