Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Quantum cryptography beyond quantum key distribution
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …
order to perform cryptographic tasks. While the most well-known example of this discipline is …
Revocable quantum timed-release encryption
D Unruh - Journal of the ACM (JACM), 2015 - dl.acm.org
Timed-release encryption is a kind of encryption scheme in which a recipient can decrypt
only after a specified amount of time T (assuming that we have a moderately precise …
only after a specified amount of time T (assuming that we have a moderately precise …
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
Consider an abstract storage device Σ(G) that can hold a single element x from a fixed,
publicly known finite group G. Storage is private in the sense that an adversary does not …
publicly known finite group G. Storage is private in the sense that an adversary does not …
Algebraic manipulation detection codes
Algebraic manipulation detection codes are a cryptographic primitive that was introduced by
Cramer et al.(Eurocrypt 2008). It encompasses several methods that were previously used in …
Cramer et al.(Eurocrypt 2008). It encompasses several methods that were previously used in …
Learning properties of quantum states without the IID assumption
We develop a framework for learning properties of quantum states beyond the assumption of
independent and identically distributed (iid) input states. We prove that, given any learning …
independent and identically distributed (iid) input states. We prove that, given any learning …
Secure anonymous conferencing in quantum networks
Users of quantum networks can securely communicate via so-called (quantum) conference
key agreement—making their identities publicly known. In certain circumstances, however …
key agreement—making their identities publicly known. In certain circumstances, however …
Experimental two‐way communication with one photon
Superposition of two or more states is one of the most fundamental concepts of quantum
mechanics and provides a basis for several advantages offered by quantum information …
mechanics and provides a basis for several advantages offered by quantum information …
Quantum anonymous notification for network-based applications
Anonymity is a desirable yet challenging requirement of communication networks. In this
paper, we present the first quantum anonymous notification (QAN) protocol that introduces …
paper, we present the first quantum anonymous notification (QAN) protocol that introduces …
Quantum tasks in Minkowski space
A Kent - Classical and Quantum Gravity, 2012 - iopscience.iop.org
The fundamental properties of quantum information and its applications to computing and
cryptography have been greatly illuminated by considering information-theoretic tasks that …
cryptography have been greatly illuminated by considering information-theoretic tasks that …
Private network parameter estimation with quantum sensors
Networks of quantum sensors are a central application of burgeoning quantum networks. A
key question for the use of such networks will be their security, particularly against malicious …
key question for the use of such networks will be their security, particularly against malicious …