{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:32:34Z","timestamp":1758893554448,"version":"3.37.3"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T00:00:00Z","timestamp":1555286400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571024"],"award-info":[{"award-number":["61571024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2016YFC1000307"],"award-info":[{"award-number":["2016YFC1000307"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11128-019-2280-z","type":"journal-article","created":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T12:41:55Z","timestamp":1555332115000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["IND-secure quantum symmetric encryption based on point obfuscation"],"prefix":"10.1007","volume":"18","author":[{"given":"Ranyiliu","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2369-1521","authenticated-orcid":false,"given":"Tao","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,15]]},"reference":[{"key":"2280_CR1","unstructured":"Ambainis, A., Mosca, M., Tapp, A., Wolf, R.D.: Private quantum channels. In: Proceedings of the 41st Annual IEEE Symposium on Foundations of Computer Science, pp. 547\u2013553 (2000)"},{"key":"2280_CR2","first-page":"609","volume-title":"Lecture Notes in Computer Science","author":"Anne Broadbent","year":"2015","unstructured":"Broadbent, A., Jeffery, S.: Quantum homomorphic encryption for circuits of low T-gate complexity. In: Proceedings of Advances in Cryptology-CRYPTO 2015, pp. 609\u2013629 (2015)"},{"issue":"7","key":"2280_CR3","doi-asserted-by":"publisher","first-page":"3455","DOI":"10.1109\/TIT.2010.2048488","volume":"56","author":"SP Desrosiers","year":"2010","unstructured":"Desrosiers, S.P., Dupuis, F.: Quantum entropic security and approximate quantum encryption. IEEE Trans. Inf. Theory 56(7), 3455\u20133464 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"2280_CR4","first-page":"41","volume":"7073","author":"B Dan","year":"2010","unstructured":"Dan, B., \u00d6zg\u00fcr, D., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. Comput. Sci. 7073(1), 41\u201369 (2010)","journal-title":"Comput. Sci."},{"issue":"4","key":"2280_CR5","doi-asserted-by":"publisher","first-page":"042314","DOI":"10.1103\/PhysRevA.94.042314","volume":"94","author":"T Shang","year":"2016","unstructured":"Shang, T., Lei, Q., Liu, J.: Quantum random oracle model for quantum digital signature. Phys. Rev. A 94(4), 042314 (2016)","journal-title":"Phys. Rev. A"},{"key":"2280_CR6","doi-asserted-by":"crossref","unstructured":"Alagic, G., Broadbent, A., Fefferman, B., Gagliardoni, T., Schaffner, C., Jules, M.St.: Computational security of quantum encryption. In: Proceedings of International Conference on Information Theoretic Security, pp. 47\u201371 (2016)","DOI":"10.1007\/978-3-319-49175-2_3"},{"key":"2280_CR7","doi-asserted-by":"crossref","unstructured":"Alagic, G., Majenz, C.: Quantum non-malleability and authentication. In: Proceedings of International Conference on Information Theoretic Security, pp. 310\u2013341 (2017)","DOI":"10.1007\/978-3-319-63715-0_11"},{"key":"2280_CR8","unstructured":"Alagic, G., Gagliardoni, T., Majenz, C.: Unforgeable Quantum Encryption (2017). \n                    arXiv:1709.06539"},{"key":"2280_CR9","first-page":"1","volume":"2001","author":"B Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. Proc. Adv. Cryptol. CRYPTO 2001, 1\u201318 (2001)","journal-title":"Proc. Adv. Cryptol. CRYPTO"},{"key":"2280_CR10","first-page":"443","volume":"2000","author":"S Hada","year":"2000","unstructured":"Hada, S.: Zero-knowledge and code obfuscation. Proc. Adv. Cryptol. ASIACRYPT 2000, 443\u2013457 (2000)","journal-title":"Proc. Adv. Cryptol. ASIACRYPT"},{"key":"2280_CR11","unstructured":"Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: Proceedings of the 46th Annual IEEE Symposium on the Foundations of Computer Science, pp. 553\u2013562 (2005)"},{"key":"2280_CR12","first-page":"20","volume":"2004","author":"B Lynn","year":"2004","unstructured":"Lynn, B., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. Proc. Adv. Cryptol. EUROCRYPT 2004, 20\u201339 (2004)","journal-title":"Proc. Adv. Cryptol. EUROCRYPT"},{"issue":"4","key":"2280_CR13","first-page":"52","volume":"79","author":"C Ran","year":"2010","unstructured":"Ran, C., Kalai, Y.T., Varia, M., et al.: On symmetric encryption and point obfuscation. Lect. Notes Comput. Sci. 79(4), 52\u201371 (2010)","journal-title":"Lect. Notes Comput. Sci."},{"key":"2280_CR14","unstructured":"Alagic, G., Fefferman, B.: On quantum obfuscation (2016). arXiv preprint \n                    arXiv:1602.01771"},{"issue":"2","key":"2280_CR15","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s11128-019-2172-2","volume":"18","author":"T Shang","year":"2019","unstructured":"Shang, T., Chen, R., Liu, J.: On the obfuscatability of quantum point functions. Quantum Inf. Process. 18(2), 55 (2019)","journal-title":"Quantum Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2280-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-019-2280-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2280-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,13]],"date-time":"2020-04-13T23:51:55Z","timestamp":1586821915000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-019-2280-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,15]]},"references-count":15,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["2280"],"URL":"https:\/\/doi.org\/10.1007\/s11128-019-2280-z","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2019,4,15]]},"assertion":[{"value":"1 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"161"}}