{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:09:54Z","timestamp":1772039394875,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971021"],"award-info":[{"award-number":["61971021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571024"],"award-info":[{"award-number":["61571024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004750","name":"Aeronautical Science Foundation of China","doi-asserted-by":"publisher","award":["2018ZC51016"],"award-info":[{"award-number":["2018ZC51016"]}],"id":[{"id":"10.13039\/501100004750","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2016YFC1000307"],"award-info":[{"award-number":["2016YFC1000307"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11128-021-03379-4","type":"journal-article","created":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T08:02:51Z","timestamp":1640678571000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Instantiation of quantum point obfuscation"],"prefix":"10.1007","volume":"21","author":[{"given":"Yuanjing","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2369-1521","authenticated-orcid":false,"given":"Tao","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Ranyiliu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,28]]},"reference":[{"key":"3379_CR1","unstructured":"Bennett, C.H.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers Institute of Electrical and Electronics Engineers, pp. 157\u2013179 (1984)"},{"issue":"4","key":"3379_CR2","doi-asserted-by":"publisher","first-page":"042311","DOI":"10.1103\/PhysRevA.61.042311","volume":"61","author":"D Gottesman","year":"1999","unstructured":"Gottesman, D.: On the theory of quantum secret sharing. Phys. Rev. A 61(4), 042311 (1999)","journal-title":"Phys. Rev. A"},{"issue":"1\u20133","key":"3379_CR3","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.optcom.2005.04.048","volume":"253","author":"C Wang","year":"2005","unstructured":"Wang, C., Deng, F.G., Long, G.L.: Multi-step quantum secure direct communication using multi-particle Green\u2013Horne\u2013Zeilinger state. Opt. Commun. 253(1\u20133), 15\u201320 (2005)","journal-title":"Opt. Commun."},{"issue":"3","key":"3379_CR4","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1103\/PhysRevA.51.R1727","volume":"51","author":"SL Braunstein","year":"1995","unstructured":"Braunstein, S.L., Mann, A.: Measurement of the Bell operator and quantum teleportation. Phys. Rev. A 51(3), 1727\u20131730 (1995)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3379_CR5","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1103\/PhysRevA.61.032308","volume":"61","author":"HF Chau","year":"2000","unstructured":"Chau, H.F.: Quantum-classical complexity-security tradeoff in secure multi-party computation. Phys. Rev. A 61(3), 167\u2013169 (2000)","journal-title":"Phys. Rev. A"},{"key":"3379_CR6","doi-asserted-by":"crossref","unstructured":"Boneh, D., Zhandry, M.: Quantum-secure message authentication codes. In: Proceedings of International Conference on the Theory & Applications of Cryptographic Techniques, pp. 592\u2013608. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-38348-9_35"},{"key":"3379_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04506-0","volume-title":"Quantum Signatures of Chaos","author":"F Haake","year":"2001","unstructured":"Haake, F.: Quantum Signatures of Chaos. Springer, Berlin (2001)"},{"key":"3379_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3386-0","volume-title":"Secure Quantum Network Coding Theory","author":"T Shang","year":"2020","unstructured":"Shang, T., Liu, J.W.: Secure Quantum Network Coding Theory. Springer, Berlin (2020)"},{"key":"3379_CR9","unstructured":"Alagic, G., Fefferman, B.: On quantum obfuscation. arXiv:1602.01771 (2016)"},{"key":"3379_CR10","doi-asserted-by":"crossref","unstructured":"Lynn, B., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. In: Proceedings of International Conference on Advances in Cryptology-Eurocrypt, pp. 20\u201339. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24676-3_2"},{"issue":"2","key":"3379_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2160158.2160159","volume":"59","author":"B Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., et al.: On the (im)possibility of obfuscating programs (extended abstract). J. ACM 59(2), 1\u201318 (2001)","journal-title":"J. ACM"},{"key":"3379_CR12","doi-asserted-by":"crossref","unstructured":"Wee, H.: On obfuscating point functions. In: Proceedings of 37th Annual ACM Symposium on Theory of Computing, pp. 523\u2013532 (2005)","DOI":"10.1145\/1060590.1060669"},{"key":"3379_CR13","unstructured":"Ran, C., Dakdouk, R.R.: Obfuscating point functions with multibit output. In: Proceedings of Theory and Applications of Cryptographic Techniques, International Conference on Advances in Cryptology, pp. 489\u2013508. Springer, Berlin (2008)"},{"key":"3379_CR14","doi-asserted-by":"crossref","unstructured":"Hada, S.: Secure obfuscation for encrypted signatures. In: Proceedings of International Conference on Theory and Applications of Cryptographic Techniques, pp. 92\u2013112. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-13190-5_5"},{"issue":"2","key":"3379_CR15","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s00145-013-9146-9","volume":"27","author":"N Bitansky","year":"2010","unstructured":"Bitansky, N., Ran, C.: On strong simulation and composable point obfuscation. J. Cryptol. 27(2), 317\u2013357 (2010)","journal-title":"J. Cryptol."},{"issue":"2","key":"3379_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s11128-019-2172-2","volume":"18","author":"T Shang","year":"2019","unstructured":"Shang, T., Chen, R.Y.L., Liu, J.W.: On the obfuscatability of quantum point functions. Quantum Inf. Process. 18(2), 55 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"3379_CR17","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/s11128-019-2280-z","volume":"18","author":"RYL Chen","year":"2019","unstructured":"Chen, R.Y.L., Shang, T., Liu, J.W.: IND-secure quantum symmetric encryption based on point obfuscation. Quantum Inf. Process. 18(6), 16 (2019)","journal-title":"Quantum Inf. Process."},{"key":"3379_CR18","doi-asserted-by":"crossref","unstructured":"Moni, N., Moti, Y.: Universal one-way hash functions and their cryptographic applications. In: Proceedings of the 21th ACM Symposium on Theory of Computing, pp. 33\u201343 (1989)","DOI":"10.1145\/73007.73011"},{"key":"3379_CR19","first-page":"428","volume-title":"One Way Hash Functions and DES, Lecture Notes in Computer Science","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: One Way Hash Functions and DES, Lecture Notes in Computer Science, vol. 435, pp. 428\u2013446. Springer, Berlin (1990)"},{"issue":"4","key":"3379_CR20","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1145\/1008731.1008734","volume":"51","author":"R Canetti","year":"2004","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. J. ACM 51(4), 557\u2013594 (2004)","journal-title":"J. ACM"},{"key":"3379_CR21","volume-title":"Signature Schemes in the Quantum Random-Oracle Model","author":"E Eaton","year":"2017","unstructured":"Eaton, E.: Signature Schemes in the Quantum Random-Oracle Model. University of Waterloo, Waterloo (2017)"},{"issue":"2","key":"3379_CR22","doi-asserted-by":"publisher","first-page":"25202","DOI":"10.1088\/1612-2011\/11\/2\/025202","volume":"11","author":"F Ablayev","year":"2014","unstructured":"Ablayev, F., Vasiliev, A.: Cryptographic quantum hashing. Laser Phys. Lett. 11(2), 25202 (2014)","journal-title":"Laser Phys. Lett."},{"issue":"1","key":"3379_CR23","doi-asserted-by":"publisher","first-page":"012019","DOI":"10.1088\/1742-6596\/681\/1\/012019","volume":"681","author":"F Ablayev","year":"2016","unstructured":"Ablayev, F., Ablayev, M., Vasiliev, A.: On the balanced quantum hashing. J. Phys. Confer. 681(1), 012019 (2016)","journal-title":"J. Phys. Confer."},{"issue":"3","key":"3379_CR24","first-page":"3","volume":"9","author":"AS Holevo","year":"1973","unstructured":"Holevo, A.S.: Bounds for the quantity of information transmitted by a quantum communication channel. Probl. Inf. Transm. 9(3), 3\u201311 (1973)","journal-title":"Probl. Inf. Transm."},{"key":"3379_CR25","doi-asserted-by":"crossref","unstructured":"Nayak, A.: Optimal lower bounds for quantum automata and random access codes. In: Proceedings of 40th Annual Symposium on Foundations of Computer Science, pp. 369\u2013377 (1999)","DOI":"10.1109\/SFFCS.1999.814608"},{"issue":"78","key":"3379_CR26","doi-asserted-by":"publisher","first-page":"032348","DOI":"10.1103\/PhysRevA.77.032348","volume":"77","author":"GM Nikolopoulos","year":"2008","unstructured":"Nikolopoulos, G.M.: Applications of single-qubit rotations in quantum public-key cryptography. Phys. Rev. A 77(78), 032348 (2008)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03379-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03379-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03379-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T07:49:32Z","timestamp":1726386572000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03379-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,28]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["3379"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03379-4","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,28]]},"assertion":[{"value":"22 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"29"}}