{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:06:46Z","timestamp":1765112806613},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491745"},{"type":"electronic","value":"9783319491752"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49175-2_4","type":"book-chapter","created":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T06:59:42Z","timestamp":1478674782000},"page":"72-91","source":"Crossref","is-referenced-by-count":25,"title":["Efficient Simulation for Quantum Message Authentication"],"prefix":"10.1007","author":[{"given":"Anne","family":"Broadbent","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Evelyn","family":"Wainewright","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,11,10]]},"reference":[{"key":"4_CR1","unstructured":"Aharonov, D., Ben-Or, M., Eban, E.: Interactive proofs for quantum computations. In: Innovations in Computer Science\u2013ICS 2010, pp. 453\u2013469 (2010). \narXiv:0810.5375"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Barnum, H., Cr\u00e9peau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: 43rd Annual Symposium on Foundations of Computer Science\u2013FOCS 2002, pp. 449\u2013458 (2002). doi:\n10.1109\/SFCS.2002.1181969","DOI":"10.1109\/SFCS.2002.1181969"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Ben-Or, M., Cr\u00e9peau, C., Gottesman, D., Hassidim, A., Smith, A.: Secure multiparty quantum computation with (only) a strict honest majority. In: 47th Annual Symposium on Foundations of Computer Science\u2013FOCS 2006, pp. 249\u2013260, (2006). doi:\n10.1109\/FOCS.2006.68","DOI":"10.1109\/FOCS.2006.68"},{"key":"4_CR4","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179 (1984)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-642-40084-1_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"A Broadbent","year":"2013","unstructured":"Broadbent, A., Gutoski, G., Stebila, D.: Quantum one-time programs. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8043, pp. 344\u2013360. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-40084-1_20"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10623-015-0157-4","volume":"78","author":"A Broadbent","year":"2016","unstructured":"Broadbent, A., Schaffner, C.: Quantum cryptography beyond quantum key distribution. Des. Codes Crypt. 78, 351\u2013382 (2016). doi:\n10.1007\/s10623-015-0157-4","journal-title":"Des. Codes Crypt."},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Bru\u00df, D., Erd\u00e9lyi, G., Meyer, T., Riege, T., Rothe, J.: Quantum cryptography: a survey. ACM Comput. Surv. (CSUR) 39(2) (2007). doi:\n10.1145\/1242471.1242474","DOI":"10.1145\/1242471.1242474"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science FOCS 2001, pp. 136\u2013145 (2001). doi:\n10.1109\/SFCS.2001.959888","DOI":"10.1109\/SFCS.2001.959888"},{"issue":"3","key":"4_CR9","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.-K.: How to share a quantum secret. Phys. Rev. Lett. 83(3), 648\u2013651 (1999). doi:\n10.1103\/PhysRevLett.83.648","journal-title":"Phys. Rev. Lett."},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"012304","DOI":"10.1103\/PhysRevA.80.012304","volume":"80","author":"C Dankert","year":"2009","unstructured":"Dankert, C., Cleve, R., Emerson, J., Livine, E.: Exact and approximate unitary 2-designs and their application to fidelity estimation. Phys. Rev. A 80, 012304 (2009). doi:\n10.1103\/PhysRevA.80.012304","journal-title":"Phys. Rev. A"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1007\/978-3-642-32009-5_46","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"F Dupuis","year":"2012","unstructured":"Dupuis, F., Nielsen, J.B., Salvail, L.: Actively secure two-party evaluation of any quantum operation. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 794\u2013811. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-32009-5_46"},{"issue":"5","key":"4_CR12","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/s10701-010-9408-4","volume":"40","author":"S Fehr","year":"2010","unstructured":"Fehr, S.: Quantum cryptography. Found. Phys. 40(5), 494\u2013531 (2010). doi:\n10.1007\/s10701-010-9408-4","journal-title":"Found. Phys."},{"key":"4_CR13","unstructured":"Gottesman, D.: Stabilizer codes and quantum error correction. Ph.D. thesis, California Institute of Technology (1997). \narXiv:quant-ph\/9705052"},{"key":"4_CR14","unstructured":"Hayden, P., Leung, D., Mayers, D.: Universal composable security of quantum message authentication with key recycling. In: QCRYPT 2011 (2011)"},{"key":"4_CR15","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-642-13190-5_25","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"D Unruh","year":"2010","unstructured":"Unruh, D.: Universally composable quantum multi-party computation. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 486\u2013505. Springer, Heidelberg (2010). doi:\n10.1007\/978-3-642-13190-5_25"},{"issue":"2","key":"4_CR17","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/1998037.1998053","volume":"42","author":"J Watrous","year":"2011","unstructured":"Watrous, J.: Guest column: an introduction to quantum information and quantum circuits. ACM SIGACT News 42(2), 52\u201367 (2011). doi:\n10.1145\/1998037.1998053","journal-title":"ACM SIGACT News"}],"container-title":["Lecture Notes in Computer Science","Information Theoretic Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49175-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T07:00:50Z","timestamp":1478674850000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49175-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491745","9783319491752"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49175-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}