Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security in quantum cryptography
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions
The continuous technological revolution, driven by transformative innovations such as
artificial intelligence, blockchain, and Internet of Things, has left an everlasting mark on the …
artificial intelligence, blockchain, and Internet of Things, has left an everlasting mark on the …
Private quantum computation: an introduction to blind quantum computing and related protocols
JF Fitzsimons - npj Quantum Information, 2017 - nature.com
Quantum technologies hold the promise of not only faster algorithmic processing of data, via
quantum computation, but also of more secure communications, in the form of quantum …
quantum computation, but also of more secure communications, in the form of quantum …
Quantum cryptography beyond quantum key distribution
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …
order to perform cryptographic tasks. While the most well-known example of this discipline is …
Verification of quantum computation: An overview of existing approaches
Quantum computers promise to efficiently solve not only problems believed to be intractable
for classical computers, but also problems for which verifying the solution is also considered …
for classical computers, but also problems for which verifying the solution is also considered …
Unconditionally verifiable blind quantum computation
Blind quantum computing (BQC) allows a client to have a server carry out a quantum
computation for them such that the client's input, output, and computation remain private. A …
computation for them such that the client's input, output, and computation remain private. A …
Verifiable measurement-only blind quantum computing with stabilizer testing
We introduce a simple protocol for verifiable measurement-only blind quantum computing.
Alice, a client, can perform only single-qubit measurements, whereas Bob, a server, can …
Alice, a client, can perform only single-qubit measurements, whereas Bob, a server, can …
Quantum homomorphic encryption for circuits of low T-gate complexity
Fully homomorphic encryption is an encryption method with the property that any
computation on the plaintext can be performed by a party having access to the ciphertext …
computation on the plaintext can be performed by a party having access to the ciphertext …
Quantum computing on encrypted data
The ability to perform computations on encrypted data is a powerful tool for protecting
privacy. Recently, protocols to achieve this on classical computing systems have been …
privacy. Recently, protocols to achieve this on classical computing systems have been …
Quantum homomorphic encryption for polynomial-sized circuits
We present a new scheme for quantum homomorphic encryption which is compact and
allows for efficient evaluation of arbitrary polynomial-sized quantum circuits. Building on the …
allows for efficient evaluation of arbitrary polynomial-sized quantum circuits. Building on the …