22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[KK11]<br />

Daniel M. Kane and Samuel A. Kutin. Quantum interpolation of polynomials. Quantum<br />

Information & Computation, 11(1&2):95–103, 2011. First published in 2009.<br />

[Sha79] Adi Shamir. How to share a secret. Commun. ACM, 22(11):612–613, 1979.<br />

[Unr10]<br />

[vD98]<br />

[WC81]<br />

[Zha12a]<br />

[Zha12b]<br />

Dominique Unruh. Universally Composable Quantum Multi-Party Computation. Advances<br />

in Cryptology — EUROCRYPT 2010, pages 486–505, 2010.<br />

Wim van Dam. Quantum oracle interrogation: Getting all information for almost half<br />

the price. In FOCS, pages 362–367, 1998.<br />

Mark N. Wegman and Larry Carter. New hash functions and their use in authentication<br />

and set equality. J. Comput. Syst. Sci., 22(3):265–279, 1981.<br />

Mark Zhandry. Secure Identity-Based Encryption in the Quantum Random Oracle<br />

Model. In Advances in Cryptology — CRYPTO, 2012. Full version available at the<br />

Cryptology ePrint Archives: http://eprint.iacr.org/2012/076/.<br />

Mark Zhandry. How to Construct Quantum Random Functions. In Proceedings of FOCS,<br />

2012. Full version available at the Cryptology ePrint Archives: http://eprint.iacr.<br />

org/2012/182/.<br />

27<br />

8. Quantum-Secure Message Authentication Codes

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!