{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:56:10Z","timestamp":1770285370077,"version":"3.49.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319637143","type":"print"},{"value":"9783319637150","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63715-0_11","type":"book-chapter","created":{"date-parts":[[2017,7,28]],"date-time":"2017-07-28T01:19:51Z","timestamp":1501204791000},"page":"310-341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Quantum Non-malleability and Authentication"],"prefix":"10.1007","author":[{"given":"Gorjan","family":"Alagic","sequence":"first","affiliation":[]},{"given":"Christian","family":"Majenz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,29]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"052328","DOI":"10.1103\/PhysRevA.70.052328","volume":"70","author":"S Aaronson","year":"2004","unstructured":"Aaronson, S., Gottesman, D.: Improved simulation of stabilizer circuits. Phys. Rev. A 70, 052328 (2004). doi:10.1103\/PhysRevA.70.052328","journal-title":"Phys. Rev. A"},{"key":"11_CR2","unstructured":"Aharonov, D., Ben-Or, M., Eban, E.: Interactive proofs for quantum computations. In: Innovations in Computer Science - ICS 2010, Proceedings, Tsinghua University, Beijing, China, 5\u20137 January 2010, pp. 453\u2013469 (2010)"},{"key":"11_CR3","unstructured":"Alagic, G., Majenz, C.: Quantum non-malleability and authentication. CoRR, abs\/1610.04214 (2016). http:\/\/arxiv.org\/abs\/1610.04214"},{"issue":"5","key":"11_CR4","doi-asserted-by":"publisher","first-page":"L55","DOI":"10.1088\/0305-4470\/37\/5\/L01","volume":"37","author":"R Alicki","year":"2004","unstructured":"Alicki, R., Fannes, M.: Continuity of quantum conditional information. J. Phys. A: Math. Gen. 37(5), L55 (2004)","journal-title":"J. Phys. A: Math. Gen."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Ambainis, A., Mosca, M., Tapp, A., De Wolf, R.: Private quantum channels. In: Proceedings of the FOCS 2000, pp. 547\u2013553 (2000)","DOI":"10.1109\/SFCS.2000.892142"},{"issue":"4","key":"11_CR6","doi-asserted-by":"publisher","first-page":"042106","DOI":"10.1063\/1.3094756","volume":"50","author":"A Ambainis","year":"2009","unstructured":"Ambainis, A., Bouda, J., Winter, A.: Nonmalleable encryption of quantum information. J. Math. Phys. 50(4), 042106 (2009)","journal-title":"J. Math. Phys."},{"key":"11_CR7","unstructured":"Barnum, H., Cr\u00e9peau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002, Proceedings, pp. 449\u2013458. IEEE (2002)"},{"issue":"3","key":"11_CR8","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/s00220-011-1309-7","volume":"306","author":"M Berta","year":"2011","unstructured":"Berta, M., Christandl, M., Renner, R.: The quantum reverse shannon theorem based on one-shot information theory. Commun. Math. Phys. 306(3), 579\u2013615 (2011)","journal-title":"Commun. Math. Phys."},{"key":"11_CR9","unstructured":"Berta, M., Brandao, F.G.S.L., Majenz, C., Wilde, M.M.: Deconstruction and conditional erasure of quantum correlations. arXiv preprint arXiv:1609.06994 (2016)"},{"key":"11_CR10","unstructured":"Brandao, F.G.S.L., Harrow, A.W., Horodecki, M.: Local random quantum circuits are approximate polynomial-designs. arXiv preprint arXiv:1208.0692 (2012)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Broadbent, A., Wainewright, E.: Efficient simulation for quantum message authentication. arXiv preprint arXiv:1607.03075 (2016)","DOI":"10.1007\/978-3-319-49175-2_4"},{"issue":"3","key":"11_CR12","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0024-3795(75)90075-0","volume":"10","author":"M-D Choi","year":"1975","unstructured":"Choi, M.-D.: Completely positive linear maps on complex matrices. Linear Algebra Appl. 10(3), 285\u2013290 (1975)","journal-title":"Linear Algebra Appl."},{"issue":"9&10","key":"11_CR13","first-page":"0721","volume":"16","author":"R Cleve","year":"2016","unstructured":"Cleve, R., Leung, D., Liu, L., Wang, C.: Near-linear constructions of exact unitary 2-designs. Quantum Inf. Comput. 16(9&10), 0721\u20130756 (2016)","journal-title":"Quantum Inf. Comput."},{"issue":"1","key":"11_CR14","doi-asserted-by":"publisher","first-page":"012304","DOI":"10.1103\/PhysRevA.80.012304","volume":"80","author":"C Dankert","year":"2009","unstructured":"Dankert, C., Cleve, R., Emerson, J., Livine, E.: Exact and approximate unitary 2-designs and their application to fidelity estimation. Phys. Rev. A 80(1), 012304 (2009)","journal-title":"Phys. Rev. A"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/978-3-642-14623-7_37","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"F Dupuis","year":"2010","unstructured":"Dupuis, F., Nielsen, J.B., Salvail, L.: Secure two-party quantum evaluation of unitaries against specious adversaries. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 685\u2013706. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-14623-7_37"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1007\/978-3-642-32009-5_46","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"F Dupuis","year":"2012","unstructured":"Dupuis, F., Nielsen, J.B., Salvail, L.: Actively secure two-party evaluation of any quantum operation. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 794\u2013811. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-32009-5_46"},{"issue":"1","key":"11_CR17","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s00220-014-1990-4","volume":"328","author":"F Dupuis","year":"2014","unstructured":"Dupuis, F., Berta, M., Wullschleger, J., Renner, R.: One-shot decoupling. Commun. Math. Phys. 328(1), 251\u2013284 (2014)","journal-title":"Commun. Math. Phys."},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Garg, S., Yuen, H., Zhandry, M.: New security notions and feasibility results for authentication of quantum data. arXiv preprint arXiv:1607.07759 (2016)","DOI":"10.1007\/978-3-319-63715-0_12"},{"issue":"4","key":"11_CR19","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/0034-4877(72)90011-0","volume":"3","author":"A Jamio\u0142kowski","year":"1972","unstructured":"Jamio\u0142kowski, A.: Linear transformations which preserve trace and positive semidefiniteness of operators. Rep. Math. Phys. 3(4), 275\u2013278 (1972)","journal-title":"Rep. Math. Phys."},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-20728-0_2","volume-title":"Information Theoretic Security","author":"A Kawachi","year":"2011","unstructured":"Kawachi, A., Portmann, C., Tanaka, K.: Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity. In: Fehr, S. (ed.) ICITS 2011. LNCS, vol. 6673, pp. 6\u201324. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-20728-0_2"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Lieb, E.H., Ruskai, M.B.: A fundamental property of quantum-mechanical entropy. Phy. Rev. Lett. 30(10), 434 (1973a)","DOI":"10.1103\/PhysRevLett.30.434"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Lieb, E.H., Ruskai, M.B.: Proof of the strong subadditivity of quantum-mechanical entropy. J. Math. Phy. 14(12), 1938\u20131941 (1973b)","DOI":"10.1063\/1.1666274"},{"key":"11_CR23","unstructured":"Low, R.A.: Pseudo-randomness and learning in quantum computation. arXiv preprint arXiv:1006.5227 (2010)"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Majenz, C., Berta, M., Dupuis, F., Renner, R., Christandl, M.: Catalytic decoupling of quantum information. arXiv preprint arXiv:1605.00514 (2016)","DOI":"10.1103\/PhysRevLett.118.080503"},{"key":"11_CR25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511976667","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2010","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, New York (2010)"},{"key":"11_CR26","unstructured":"Portmann, C.: Quantum authentication with key recycling. ArXiv e-prints, October 2016"},{"issue":"2","key":"11_CR27","first-page":"211","volume":"6","author":"WF Stinespring","year":"1955","unstructured":"Stinespring, W.F.: Positive functions on c*-algebras. Proc. Am. Math. Soc. 6(2), 211\u2013216 (1955)","journal-title":"Proc. Am. Math. Soc."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63715-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T18:33:09Z","timestamp":1750789989000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-63715-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319637143","9783319637150"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63715-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"29 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRYPTO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Cryptology Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Barbara","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"37","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crypto2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iacr.org\/conferences\/crypto2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}