Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On the computational hardness needed for quantum cryptography
In the classical model of computation, it is well established that one-way functions (OWF) are
minimal for computational cryptography: They are essential for almost any cryptographic …
minimal for computational cryptography: They are essential for almost any cryptographic …
[PDF][PDF] A one-query lower bound for unitary synthesis and breaking quantum cryptography
The Unitary Synthesis Problem (Aaronson-Kuperberg 2007) asks whether any n-qubit
unitary U can be implemented by an efficient quantum algorithm A augmented with an …
unitary U can be implemented by an efficient quantum algorithm A augmented with an …
Quantum computing: Lecture notes
R De Wolf - arxiv preprint arxiv:1907.09415, 2019 - arxiv.org
This is a set of lecture notes suitable for a Master's course on quantum computation and
information from the perspective of theoretical computer science. The first version was …
information from the perspective of theoretical computer science. The first version was …
Secure software leasing
Formulating cryptographic definitions to protect against software piracy is an important
research direction that has not received much attention. Since natural definitions using …
research direction that has not received much attention. Since natural definitions using …
Lower bounds on ground-state energies of local Hamiltonians through the renormalization group
Given a renormalization scheme, we show how to formulate a tractable convex relaxation of
the set of feasible local density matrices of a many-body quantum system. The relaxation is …
the set of feasible local density matrices of a many-body quantum system. The relaxation is …
Commitments to quantum states
What does it mean to commit to a quantum state? In this work, we propose a simple answer:
a commitment to quantum messages is binding if, after the commit phase, the committed …
a commitment to quantum messages is binding if, after the commit phase, the committed …
Quantum pseudorandom scramblers
Quantum pseudorandom state generators (PRSG s) have stimulated exciting developments
in recent years. A PRSG, on a fixed initial (eg, all-zero) state, produces an output state that is …
in recent years. A PRSG, on a fixed initial (eg, all-zero) state, produces an output state that is …
Non-interactive classical verification of quantum computation
In a recent breakthrough, Mahadev constructed an interactive protocol that enables a purely
classical party to delegate any quantum computation to an untrusted quantum prover. We …
classical party to delegate any quantum computation to an untrusted quantum prover. We …
Intractability of electronic structure in a fixed basis
Finding the ground-state energy of electrons subject to an external electric field is a
fundamental problem in computational chemistry. While the theory of QMA-completeness …
fundamental problem in computational chemistry. While the theory of QMA-completeness …
Post-quantum zero knowledge in constant rounds
N Bitansky, O Shmueli - Proceedings of the 52nd Annual ACM SIGACT …, 2020 - dl.acm.org
We construct a constant-round zero-knowledge classical argument for NP secure against
quantum attacks. We assume the existence of Quantum Fully-Homomorphic Encryption and …
quantum attacks. We assume the existence of Quantum Fully-Homomorphic Encryption and …