related words |
unassisted |
composability |
mother |
sealing |
nordholt |
breeding |
achievability |
dominic |
attacker |
tamaki |
vernam |
sifting |
cheaters |
password |
decrypt |
slepian |
untagged |
authenticate |
cheater |
adversarys |
|
related documents |
Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
Possibility, Impossibility and Cheat-Sensitivity of Quantum Bit String
Commitment [0504078v2] |
Unconditionally Secure Commitment of a Certified Classical Bit is
Impossible [9910087v2] |
Are Rindler Quanta Real? Inequivalent particle concepts in quantum field
theory [0008030v1] |
Coin Tossing is Strictly Weaker Than Bit Commitment [9810067v3] |
Coordinating quantum agents' perspectives: convex operational theories,
quantum information, and quantum foundations [0611110v1] |
Quantum Weakest Preconditions [0501157v2] |
|
related topics |
{key, protocol, security} |
{observables, space, algebra} |
{vol, operators, histories} |
{alice, bob, state} |
{states, state, optimal} |
{theory, mechanics, state} |
{information, entropy, channel} |
{let, theorem, proof} |
{group, space, representation} |
{operator, operators, space} |
{measurement, state, measurements} |
{particle, mechanics, theory} |
{algorithm, log, probability} |
{qubit, qubits, gate} |
{time, systems, information} |
{field, particle, equation} |
{wave, scattering, interference} |
{error, code, errors} |
{force, casimir, field} |
{state, algorithm, problem} |
|