Sciweavers

515 search results - page 61 / 103
» Classically-controlled Quantum Computation
Sort
View
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
16 years 4 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
ICS
2010
Tsinghua U.
16 years 25 days ago
On the Power of a Unique Quantum Witness
Rahul Jain, Iordanis Kerenidis, Greg Kuperberg, Mi...
95
Voted
STACS
2007
Springer
15 years 9 months ago
Quantum Network Coding
Masahito Hayashi, Kazuo Iwama, Harumichi Nishimura...
PRDC
2006
IEEE
15 years 9 months ago
Quantum Oblivious Transfer and Fair Digital Transactions
Yao-Hsin Chou, I-Ming Tsai, Chien-Ming Ko, Sy-Yen ...