Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Verification of quantum computation: An overview of existing approaches
Quantum computers promise to efficiently solve not only problems believed to be intractable
for classical computers, but also problems for which verifying the solution is also considered …
for classical computers, but also problems for which verifying the solution is also considered …
Faster packed homomorphic operations and efficient circuit bootstrap** for TFHE
In this paper, we present several methods to improve the evaluation of homomorphic
functions in TFHE, both for fully and for leveled homomorphic encryption. We propose two …
functions in TFHE, both for fully and for leveled homomorphic encryption. We propose two …
Improved multiparty quantum private comparison based on quantum homomorphic encryption
JW Zhang, G Xu, XB Chen, Y Chang… - Physica A: Statistical …, 2023 - Elsevier
Quantum homomorphic encryption has obvious superiority in privacy protection. In this
paper, we propose an improved multiparty quantum private comparison protocol based on …
paper, we propose an improved multiparty quantum private comparison protocol based on …
Verifier-on-a-leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
The problem of reliably certifying the outcome of a computation performed by a quantum
device is rapidly gaining relevance. We present two protocols for a classical verifier to …
device is rapidly gaining relevance. We present two protocols for a classical verifier to …
[PDF][PDF] How to use quantum indistinguishability obfuscation
Quantum copy protection, introduced by Aaronson, enables giving out a quantum program-
description that cannot be meaningfully duplicated. Despite over a decade of study, copy …
description that cannot be meaningfully duplicated. Despite over a decade of study, copy …
Obfuscation of pseudo-deterministic quantum circuits
We show how to obfuscate pseudo-deterministic quantum circuits, assuming the quantum
hardness of learning with errors (QLWE) and post-quantum virtual black-box (VBB) …
hardness of learning with errors (QLWE) and post-quantum virtual black-box (VBB) …
QFactory: classically-instructed remote secret qubits preparation
The functionality of classically-instructed remotely prepared random secret qubits was
introduced in (Cojocaru et al. 2018) as a way to enable classical parties to participate in …
introduced in (Cojocaru et al. 2018) as a way to enable classical parties to participate in …
Grover algorithm-based quantum homomorphic encryption ciphertext retrieval scheme in quantum cloud computing
Existing classical ciphertext retrieval schemes are mainly developed according to the
homomorphic encryption that is a cryptographic technique based on computational …
homomorphic encryption that is a cryptographic technique based on computational …
Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation
Quantum homomorphic encryption (QHE) allows computation on encrypted data by
employing the principles of quantum mechanics. Usually, only one evaluator is chosen to …
employing the principles of quantum mechanics. Usually, only one evaluator is chosen to …
Quantum homomorphic encryption scheme with flexible number of evaluator based on (k, n)-threshold quantum state sharing
XB Chen, YR Sun, G Xu, YX Yang - Information Sciences, 2019 - Elsevier
Quantum homomorphic encryption provides the ability to perform calculations on encrypted
data without decrypting them. The number of evaluators in most previous schemes is 1, and …
data without decrypting them. The number of evaluators in most previous schemes is 1, and …