{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:08:27Z","timestamp":1772039307390,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,1,12]],"date-time":"2019-01-12T00:00:00Z","timestamp":1547251200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61571024"],"award-info":[{"award-number":["61571024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the National Key Research and Development Program of China","award":["2016YFC1000307"],"award-info":[{"award-number":["2016YFC1000307"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s11128-019-2172-2","type":"journal-article","created":{"date-parts":[[2019,1,12]],"date-time":"2019-01-12T05:09:15Z","timestamp":1547269755000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["On the obfuscatability of quantum point functions"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2369-1521","authenticated-orcid":false,"given":"Tao","family":"Shang","sequence":"first","affiliation":[]},{"given":"Ran-yi-liu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jian-wei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,12]]},"reference":[{"key":"2172_CR1","doi-asserted-by":"crossref","unstructured":"Hada, S.: Zero-knowledge and code obfuscation. In: Advances in Cryptology-ASIACRYPT, vol. 2000, pp. 443\u2013457 (2000)","DOI":"10.1007\/3-540-44448-3_34"},{"key":"2172_CR2","doi-asserted-by":"crossref","unstructured":"Barak, B. et\u00a0al.: On the (im) possibility of obfuscating programs. In: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp. 1\u201318 (2001)","DOI":"10.1007\/3-540-44647-8_1"},{"key":"2172_CR3","doi-asserted-by":"crossref","unstructured":"Lynn, B., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. In: Advances in Cryptology-EUROCRYPT 2004, pp. 20\u201339 (2004)","DOI":"10.1007\/978-3-540-24676-3_2"},{"key":"2172_CR4","doi-asserted-by":"crossref","unstructured":"Canetti, R., Dakdouk, R.: Obfuscating point functions with multibit output. In: Advances in Cryptology-EUROCRYPT 2008, pp. 489\u2013508 (2008)","DOI":"10.1007\/978-3-540-78967-3_28"},{"key":"2172_CR5","doi-asserted-by":"crossref","unstructured":"Canetti, R., Kalai, Y.T., Varia, M., Wichs, D.: On symmetric encryption and point obfuscation. In: Theory of Cryptography Conference, pp. 52\u201371 (2010)","DOI":"10.1007\/978-3-642-11799-2_4"},{"key":"2172_CR6","doi-asserted-by":"crossref","unstructured":"Pandey, O., Prabhakaran, M., Sahai, A.: Obfuscation-based non-black-box simulation and four message concurrent zero knowledge for np. In: Theory of Cryptography Conference, pp. 638\u2013667 (2015)","DOI":"10.1007\/978-3-662-46497-7_25"},{"key":"2172_CR7","doi-asserted-by":"crossref","unstructured":"Bellare, M., Stepanovs, I.: Point-function obfuscation: a framework and generic constructions. In: Theory of Cryptography Conference, pp. 565\u2013594 (2016)","DOI":"10.1007\/978-3-662-49099-0_21"},{"key":"2172_CR8","doi-asserted-by":"crossref","unstructured":"Komargodski, I., Yogev, E.: Another step towards realizing random oracles: non-malleable point obfuscation. In: Advances in Cryptology-EUROCRYPT 2018. Lecture Notes in Computer Science, vol. 10820 (2018)","DOI":"10.1007\/978-3-319-78381-9_10"},{"key":"2172_CR9","unstructured":"Alagic, G., Jeffery, S., Jordan, S.: Circuit obfuscation using braids. In: Proceedings of 9th Conference on the Theory of Quantum Computation, Communication and Cryptography, vol. 141 (2014)"},{"key":"2172_CR10","unstructured":"Alagic, G., Fefferman, B.: On Quantum Obfuscation. (2016). \n                    arXiv:1602.01771"},{"key":"2172_CR11","first-page":"29","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielson","year":"2000","unstructured":"Nielson, M.A., Chuang, I.L.: Quantum Computation and Quantum Information, pp. 29\u201334. Cambridge University Press, Cambridge (2000)"},{"key":"2172_CR12","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, vol. 62 (1993)","DOI":"10.1145\/168588.168596"},{"key":"2172_CR13","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1137\/S0097539796300933","volume":"26","author":"CH Bennett","year":"1997","unstructured":"Bennett, C.H., Bernstein, E., Brassard, G., Vazirani, U.: Strengths and weaknesses of quantum computing. SIAM J. Comput. 26, 1510\u20131523 (1997)","journal-title":"SIAM J. Comput."},{"key":"2172_CR14","doi-asserted-by":"crossref","unstructured":"Boneh, D. et\u00a0al.: Random oracles in a quantum world. In: Advances in Cryptology-ASIACRYPT 2011, vol. 41 (2011)","DOI":"10.1007\/978-3-642-25385-0_3"},{"key":"2172_CR15","doi-asserted-by":"crossref","unstructured":"Nir, B., Omer, P.: Point obfuscation and 3-round zero-knowledge. In: International Conference on Theory of Cryptography, pp. 190\u2013208 (2012)","DOI":"10.1007\/978-3-642-28914-9_11"},{"key":"2172_CR16","first-page":"361","volume":"14","author":"AD Bookatz","year":"2012","unstructured":"Bookatz, A.D.: QMA-complete problems. Quantum Inf. Comput. 14, 361\u2013383 (2012)","journal-title":"Quantum Inf. Comput."},{"key":"2172_CR17","doi-asserted-by":"crossref","unstructured":"Kobayashi, H.: General properties of quantum zero-knowledge proofs. In: Conference on Theory of Cryptography, pp. 107\u2013124 (2008)","DOI":"10.1007\/978-3-540-78524-8_7"},{"key":"2172_CR18","doi-asserted-by":"crossref","unstructured":"Dunjko, V. et\u00a0al.: Composable security of delegated quantum computation. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 406\u2013425 (2014)","DOI":"10.1007\/978-3-662-45608-8_22"},{"key":"2172_CR19","doi-asserted-by":"publisher","first-page":"4085","DOI":"10.1103\/PhysRevA.89.060302","volume":"89","author":"T Morimae","year":"2014","unstructured":"Morimae, T.: Verification for measurement-only blind quantum computing. Phys. Rev. A 89, 4085\u20134088 (2014)","journal-title":"Phys. Rev. A"},{"key":"2172_CR20","doi-asserted-by":"publisher","first-page":"220502","DOI":"10.1103\/PhysRevLett.115.220502","volume":"115","author":"M Hayashi","year":"2015","unstructured":"Hayashi, M., Morimae, T.: Measurement-only blind quantum computing with stabilizer testing. Phys. Rev. Lett. 115, 220502 (2015)","journal-title":"Phys. Rev. Lett."},{"key":"2172_CR21","first-page":"1154","volume":"52","author":"HK Lo","year":"1996","unstructured":"Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 52, 1154\u20131162 (1996)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-019-2172-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2172-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2172-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,11]],"date-time":"2020-01-11T19:26:34Z","timestamp":1578770794000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-019-2172-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,12]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["2172"],"URL":"https:\/\/doi.org\/10.1007\/s11128-019-2172-2","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,12]]},"assertion":[{"value":"26 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"55"}}