共 26 条
[1]
New Approaches for Quantum Copy-Protection
[J].
ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I,
2021, 12825
:526-555
[2]
Aaronson S, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P41
[3]
Quantum Copy-Protection and Quantum Money
[J].
PROCEEDINGS OF THE 24TH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY,
2009,
:229-242
[4]
One-Shot Signatures and Applications to Hybrid Quantum/Classical Authentication
[J].
PROCEEDINGS OF THE 52ND ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '20),
2020,
:255-268
[5]
Unclonable Encryption, Revisited
[J].
THEORY OF CRYPTOGRAPHY, TCC 2021, PT I,
2021, 13042
:299-329
[6]
Secure Software Leasing
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II,
2021, 12697
:501-530
[7]
Strengths and weaknesses of quantum computing
[J].
SIAM JOURNAL ON COMPUTING,
1997, 26 (05)
:1510-1523
[8]
Broadbent A., 2020, 15 C THEOR QUANT COM, DOI [DOI 10.4230/LIPICS.TQC.2020.4, 10.4230/LIPICS.TQC.2020.4]
[9]
Secure Software Leasing Without Assumptions
[J].
THEORY OF CRYPTOGRAPHY, TCC 2021, PT I,
2021, 13042
:90-120
[10]
Coladangelo A., 2020, Quantum copy-protection of computeand-compare programs in the quantum random oracle model