{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T05:45:21Z","timestamp":1771479921245,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030904586","type":"print"},{"value":"9783030904593","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-90459-3_4","type":"book-chapter","created":{"date-parts":[[2021,11,5]],"date-time":"2021-11-05T21:34:31Z","timestamp":1636148071000},"page":"90-120","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Secure Software Leasing Without Assumptions"],"prefix":"10.1007","author":[{"given":"Anne","family":"Broadbent","sequence":"first","affiliation":[]},{"given":"Stacey","family":"Jeffery","sequence":"additional","affiliation":[]},{"given":"S\u00e9bastien","family":"Lord","sequence":"additional","affiliation":[]},{"given":"Supartha","family":"Podder","sequence":"additional","affiliation":[]},{"given":"Aarthi","family":"Sundaram","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,4]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","unstructured":"Aaronson, S.: Quantum copy-protection and quantum money. In: 24th Annual Conference on Computational Complexity\u2013CCC 2009, pp. 229\u2013242 (2009). https:\/\/doi.org\/10.1109\/CCC.2009.42","DOI":"10.1109\/CCC.2009.42"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Aaronson, S., Christiano, P.: Quantum money from hidden subspaces. In: 44th Annual ACM Symposium on Theory of Computing\u2013STOC 2012, pp. 41\u201360 (2012). https:\/\/doi.org\/10.1145\/2213977.2213983","DOI":"10.1145\/2213977.2213983"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Aaronson, S., Liu, J., Liu, Q., Zhandry, M., Zhang, R.: New approaches for quantum copy-protection. In: Advances in Cryptology\u2013CRYPTO 2021, vol. 1, pp. 526\u2013555 (2021). https:\/\/doi.org\/10.1007\/978-3-030-84242-0_19","DOI":"10.1007\/978-3-030-84242-0_19"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Alagic, G., Majenz, C.: Quantum non-malleability and authentication. In: Advances in Cryptology\u2013CRYPTO 2017, vol. 2, pp. 310\u2013341 (2017). https:\/\/doi.org\/10.1007\/978-3-319-63715-0_11","DOI":"10.1007\/978-3-319-63715-0_11"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Ananth, P., La Placa, R.L.: Secure software leasing. In: Advances in Cryptology\u2013EUROCRYPT 2021, vol. 2, pp. 501\u2013530 (2021). https:\/\/doi.org\/10.1007\/978-3-030-77886-6_17","DOI":"10.1007\/978-3-030-77886-6_17"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Barnum, H., Cr\u00e9peau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: 43rd Annual Symposium on Foundations of Computer Science\u2013FOCS 2002, pp. 449\u2013485 (2002). https:\/\/doi.org\/10.1109\/SFCS.2002.1181969","DOI":"10.1109\/SFCS.2002.1181969"},{"key":"4_CR7","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179 (1984)"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Broadbent, A., Lord, S.: Uncloneable Quantum Encryption via Oracles. In: 15th Conference on the Theory of Quantum Computation, Communication and Cryptography\u2013TQC 2020, pp. 4:1\u20134:22 (2020). https:\/\/doi.org\/10.4230\/LIPIcs.TQC.2020.4","DOI":"10.4230\/LIPIcs.TQC.2020.4"},{"issue":"1","key":"4_CR9","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10623-015-0157-4","volume":"78","author":"A Broadbent","year":"2016","unstructured":"Broadbent, A., Schaffner, C.: Quantum cryptography beyond quantum key distribution. Des. Codes Crypt. 78(1), 351\u2013382 (2016). https:\/\/doi.org\/10.1007\/s10623-015-0157-4","journal-title":"Des. Codes Crypt."},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"Cleve, R., Leung, D., Liu, L., Wang, C.: Near-linear constructions of exact unitary 2-designs. Quantum Inf. Comput. 16(9\u201310), 721\u2013756 (2016). https:\/\/doi.org\/10.26421\/QIC16.9-10-1","DOI":"10.26421\/QIC16.9-10-1"},{"key":"4_CR11","unstructured":"Coladangelo, A., Majenz, C., Poremba, A.: Quantum copy-protection of compute-and-compare programs in the quantum random oracle model. arXiv preprint arXiv:2009.13865 (2020)"},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"Dankert, C., Cleve, R., Emerson, J., Livine, E.: Exact and approximate unitary 2-designs and their application to fidelity estimation. Phys. Rev. A 80, 012304 (2009). https:\/\/doi.org\/10.1103\/PhysRevA.80.012304","DOI":"10.1103\/PhysRevA.80.012304"},{"issue":"6","key":"4_CR13","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/0375-9601(82)90084-6","volume":"92","author":"D Dieks","year":"1982","unstructured":"Dieks, D.: Communication by EPR devices. Phys. Lett. A 92(6), 271\u2013272 (1982). https:\/\/doi.org\/10.1016\/0375-9601(82)90084-6","journal-title":"Phys. Lett. A"},{"key":"4_CR14","doi-asserted-by":"publisher","unstructured":"Dulek, Y., Speelman, F.: Quantum ciphertext authentication and key recycling with the trap code. In: 13th Conference on the Theory of Quantum Computation, Communication and Cryptography\u2013TQC 2018. pp. 1:1\u20131:17 (2018). https:\/\/doi.org\/10.4230\/LIPIcs.TQC.2018.1","DOI":"10.4230\/LIPIcs.TQC.2018.1"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Dupuis, F., Nielsen, J.B., Salvail, L.: Actively secure two-party evaluation of any quantum operation. In: Advances in Cryptology\u2013CRYPTO 2012, pp. 794\u2013811 (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_46","DOI":"10.1007\/978-3-642-32009-5_46"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Gao, J.: Quantum union bounds for sequential projective measurements. Phys. Rev. A 92(5), 052331 (2015). https:\/\/doi.org\/10.1103\/PhysRevA.92.052331","DOI":"10.1103\/PhysRevA.92.052331"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Garg, S., Yuen, H., Zhandry, M.: New security notions and feasibility results for authentication of quantum data. In: Advances in Cryptology\u2013CRYPTO 2017, vol. 2, pp. 342\u2013371 (2017). https:\/\/doi.org\/10.1007\/978-3-319-63715-0_12","DOI":"10.1007\/978-3-319-63715-0_12"},{"key":"4_CR18","doi-asserted-by":"publisher","unstructured":"Gottesman, D.: Uncloneable encryption. Quantum Inf. Comput. 3(6), 581\u2013602 (2003). https:\/\/doi.org\/10.26421\/QIC3.6-2","DOI":"10.26421\/QIC3.6-2"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Kitagawa, F., Nishimaki, R., Yamakawa, T.: Secure software leasing from standard assumptions. arXiv preprint arXiv:2010.11186 (2020)","DOI":"10.1007\/978-3-030-90459-3_2"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Mosca, M., Stebila, D.: Quantum coins. In: Error-Correcting Codes, Finite Geometries and Cryptography, pp. 35\u201347 (2010)","DOI":"10.1090\/conm\/523\/10311"},{"issue":"1","key":"4_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/PL00003817","volume":"12","author":"M Naor","year":"1999","unstructured":"Naor, M., Reingold, O.: On the construction of pseudorandom permutations: Luby\u2013Rackoff revisited. J. Cryptology 12(1), 29\u201366 (1999). https:\/\/doi.org\/10.1007\/PL00003817","journal-title":"J. Cryptology"},{"issue":"1","key":"4_CR22","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/BF00708652","volume":"1","author":"JL Park","year":"1970","unstructured":"Park, J.L.: The concept of transition in quantum mechanics. Found. Phys. 1(1), 23\u201333 (1970). https:\/\/doi.org\/10.1007\/BF00708652","journal-title":"Found. Phys."},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Watrous, J.: The Theory of Quantum Information. 1st edn, Cambridge University Press, Cambridge (2018)","DOI":"10.1017\/9781316848142"},{"issue":"1","key":"4_CR24","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1008908.1008920","volume":"15","author":"S Wiesner","year":"1983","unstructured":"Wiesner, S.: Conjugate coding. ACM SIGACT News 15(1), 78\u201388 (1983). https:\/\/doi.org\/10.1145\/1008908.1008920","journal-title":"ACM SIGACT News"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802\u2013803 (1982). https:\/\/doi.org\/10.1038\/299802a0","journal-title":"Nature"}],"container-title":["Lecture Notes in Computer Science","Theory of Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-90459-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T00:02:40Z","timestamp":1730764960000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-90459-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030904586","9783030904593"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-90459-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"4 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Theory of Cryptography Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Raleigh, NC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tcc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/tcc.iacr.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Websubrev","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"161","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}