{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T18:46:56Z","timestamp":1767034016868},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642146220"},{"type":"electronic","value":"9783642146237"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14623-7_37","type":"book-chapter","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T04:15:26Z","timestamp":1281413726000},"page":"685-706","source":"Crossref","is-referenced-by-count":37,"title":["Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries"],"prefix":"10.1007","author":[{"given":"Fr\u00e9d\u00e9ric","family":"Dupuis","sequence":"first","affiliation":[]},{"given":"Jesper Buus","family":"Nielsen","sequence":"additional","affiliation":[]},{"given":"Louis","family":"Salvail","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Aharonov, D., Ben-Or, M.: Fault-tolerant quantum computation with constant error. In: 29th Annual ACM Symposium on Theory of Computing (STOC), pp. 176\u2013188 (1997)","DOI":"10.1145\/258533.258579"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Ambainis, A., Mosca, M., Tapp, A., de Wolf, R.: Private quantum channels. In: 41st Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 547\u2013553 (2000)","DOI":"10.1109\/SFCS.2000.892142"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Cr\u00e9peau, C., Gottesman, D., Hassidim, A., Smith, A.: Secure multiparty quantum computation with (only) a strict honest majority. In: 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 249\u2013260 (2006)","DOI":"10.1109\/FOCS.2006.68"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Broadbent, A., Fitzsimons, J., Kashefi, E.: Universal blind quantum computation (December 2009), http:\/\/arxiv.org\/abs\/0807.4154","DOI":"10.1109\/FOCS.2009.36"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau, C., Gottesman, D., Smith, A.: Secure multi-party quantum computation. In: 34th Annual ACM Symposium on Theory of Computing (STOC), pp. 643\u2013652 (2002)","DOI":"10.1145\/509907.510000"},{"key":"37_CR6","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1038\/46503","volume":"402","author":"D. Gottesman","year":"1999","unstructured":"Gottesman, D., Chuang, I.L.: Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations. Nature\u00a0402, 390\u2013393 (1999)","journal-title":"Nature"},{"key":"37_CR7","unstructured":"Gottesman, D., Chuang, I.L.: Quantum teleportation is a universal computational primitive (August 1999), http:\/\/arxiv.org\/abs\/quant-ph\/9908010"},{"key":"37_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/978-3-540-31856-9_50","volume-title":"STACS 2005","author":"G. Gutoski","year":"2005","unstructured":"Gutoski, G., Watrous, J.: Quantum interactive proofs with competing provers. In: Diekert, V., Durand, B. (eds.) STACS 2005. LNCS, vol.\u00a03404, pp. 605\u2013616. Springer, Heidelberg (2005)"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Kilian, J.: Founding cryptography on oblivious transfer. In: 20th Annual ACM Symposium on Theory of Computing (STOC), pp. 20\u201331 (1988)","DOI":"10.1145\/62212.62215"},{"issue":"2","key":"37_CR10","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1103\/PhysRevA.56.1154","volume":"56","author":"H.-K. Lo","year":"1997","unstructured":"Lo, H.-K.: Insecurity of quantum secure computations. Physical Review A\u00a056(2), 1154\u20131162 (1997)","journal-title":"Physical Review A"},{"key":"37_CR11","doi-asserted-by":"publisher","first-page":"3410","DOI":"10.1103\/PhysRevLett.78.3410","volume":"78","author":"H.-K. Lo","year":"1997","unstructured":"Lo, H.-K., Chau, H.F.: Is quantum bit commitment really possible? Physical Review Letters\u00a078, 3410\u20133413 (1997)","journal-title":"Physical Review Letters"},{"key":"37_CR12","doi-asserted-by":"publisher","first-page":"3414","DOI":"10.1103\/PhysRevLett.78.3414","volume":"78","author":"D. Mayers","year":"1997","unstructured":"Mayers, D.: Unconditionally secure quantum bit commitment is impossible. Physical Review Letters\u00a078, 3414\u20133417 (1997)","journal-title":"Physical Review Letters"},{"key":"37_CR13","volume-title":"Quantum Computation and Quantum Information","author":"M.A. Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"issue":"3","key":"37_CR14","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/BF02058098","volume":"24","author":"S. Popescu","year":"1994","unstructured":"Popescu, S., Rohrlich, D.: Quantum nonlocality as an axiom. Foundations of Physics\u00a024(3), 379\u2013385 (1994)","journal-title":"Foundations of Physics"},{"key":"37_CR15","unstructured":"Popescu, S., Rohrlich, D.: Causality and nonlocality as axioms for quantum mechanics. In: Symposium on Causality and Locality in Modern Physics and Astronomy: Open Questions and Possible Solutions (1997), http:\/\/arxiv.org\/abs\/quant-ph\/9709026"},{"key":"37_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-3-540-30576-7_22","volume-title":"Theory of Cryptography","author":"R. Renner","year":"2005","unstructured":"Renner, R., K\u00f6nig, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 407\u2013425. Springer, Heidelberg (2005)"},{"key":"37_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-10366-7_5","volume-title":"ASIACRYPT 2009","author":"L. Salvail","year":"2009","unstructured":"Salvail, L., Sot\u00e1kov\u00e1, M., Schaffner, C.: On the power of two-party quantum cryptography. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 70\u201387. Springer, Heidelberg (2009)"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Fault-tolerant quantum computation. In: 37th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 56\u201365 (1996)","DOI":"10.1109\/SFCS.1996.548464"},{"key":"37_CR19","unstructured":"Smith, A.: Techniques for secure distributed computing with quantum data. Presented at the Field\u2019s institute Quantum Cryptography and Computing Workshop (October 2006)"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Watrous, J.: Limits on the power of quantum statistical zero-knowledge. In: 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 459\u2013468 (2002)","DOI":"10.1109\/SFCS.2002.1181970"},{"key":"37_CR21","doi-asserted-by":"crossref","unstructured":"Wolf, S., Wullschleger, J.: Oblivious transfer and quantum non-locality. In: International Symposium on Information Theory (ISIT 2005), pp. 1745\u20131748 (2005)","DOI":"10.1109\/ISIT.2005.1523644"},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"Yao, A.: How to generate and exchange secrets. In: 27th Annual IEEE Symposium on Foundations of Computer Science (FOCS) (1986)","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14623-7_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:55:44Z","timestamp":1606168544000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14623-7_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642146220","9783642146237"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14623-7_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}