{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T19:06:42Z","timestamp":1775070402033,"version":"3.50.1"},"reference-count":115,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund (FEDER) through the Competitiveness and Internationalization Operational Program","doi-asserted-by":"publisher","award":["POCI-01-0247-FEDER-039728"],"award-info":[{"award-number":["POCI-01-0247-FEDER-039728"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia through National Funds","doi-asserted-by":"publisher","award":["SFRH\/BD\/144806\/2019"],"award-info":[{"award-number":["SFRH\/BD\/144806\/2019"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia through National Funds","doi-asserted-by":"publisher","award":["UIDB\/50008\/2020"],"award-info":[{"award-number":["UIDB\/50008\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia through National Funds","doi-asserted-by":"publisher","award":["UIDP\/50008\/2020"],"award-info":[{"award-number":["UIDP\/50008\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Regional Operational Program of Lisbon, under the Project QuantumMining","award":["POCI-01-0145-FEDER-031826"],"award-info":[{"award-number":["POCI-01-0145-FEDER-031826"]}]},{"DOI":"10.13039\/501100001871","name":"AIT\u2014Austrian Institute of Technology GmbH and 37 Further Beneficiaries of OpenQKD","doi-asserted-by":"publisher","award":["857156"],"award-info":[{"award-number":["857156"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"AIT\u2014Austrian Institute of Technology GmbH and 37 Further Beneficiaries of OpenQKD","doi-asserted-by":"publisher","award":["SFRH\/BD\/144806\/2019"],"award-info":[{"award-number":["SFRH\/BD\/144806\/2019"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3158416","type":"journal-article","created":{"date-parts":[[2022,3,10]],"date-time":"2022-03-10T20:25:06Z","timestamp":1646943906000},"page":"38065-38088","source":"Crossref","is-referenced-by-count":12,"title":["Private Computation of Phylogenetic Trees Based on Quantum Technologies"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4156-8607","authenticated-orcid":false,"given":"Manuel B.","family":"Santos","sequence":"first","affiliation":[{"name":"Departamento de Matem&#x00E1;tica, Instituto Superior T&#x00E9;cnico, Lisboa, Portugal"}]},{"given":"Ana C.","family":"Gomes","sequence":"additional","affiliation":[{"name":"CBR Genomics, Cantanhede, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2101-5896","authenticated-orcid":false,"given":"Armando N.","family":"Pinto","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal"}]},{"given":"Paulo","family":"Mateus","sequence":"additional","affiliation":[{"name":"Departamento de Matem&#x00E1;tica, Instituto Superior T&#x00E9;cnico, Lisboa, Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1202811"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1126\/science.1229566"},{"key":"ref6","volume-title":"2016 Reform of EU Data Protection Rules","year":"2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_11"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"ref11","article-title":"How to exchange secrets with oblivious transfer","author":"Rabin","year":"1981"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1137\/s0097539795293172"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2200\/S00735ED1V01Y201609SPT018"},{"key":"ref14","first-page":"1192","article-title":"A guide to fully homomorphic encryption","volume":"2015","author":"Armknecht","year":"2015","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5220\/0006858503540365"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56904-8_12"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5220\/0006841404880497"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0930-9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3122-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/s41525-017-0036-1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbz013"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2767007"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1038\/srep05233"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-017-08229-x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON51198.2020.9203042"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ConfTELE50222.2021.9435479"},{"key":"ref27","article-title":"A secure quantum communications infrastructure for Europe","author":"Lewis","year":"2019"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/app10124080"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.83.022301"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2177772"},{"key":"ref31","volume-title":"Libscapi","year":"2021"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055817"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s12052-010-0273-6"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198567028.001.0001"},{"key":"ref35","volume-title":"Inferring Phylogenies","author":"Felsenstein","year":"2003"},{"key":"ref36","first-page":"164","article-title":"PHYLIP\u2014Phylogeny inference package","volume":"5","author":"Felsenstein","year":"1989","journal-title":"Cladistics"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/B978-1-4832-3211-9.50009-7","volume-title":"Mammalian Protein Metabolism","author":"Jukes","year":"1969"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/BF01731581"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.molbev.a025575"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.molbev.a040136"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511819049"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1561\/9781680835090"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57048-8_6"},{"key":"ref44","volume-title":"Secure multi-party computation","volume":"78","author":"Goldreich","year":"1998"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62215"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73012"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"ref48","first-page":"35","article-title":"Faster secure two-party computation using garbled circuits","volume-title":"Proc. 20th USENIX Secur. Symp.","author":"Huang"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22184"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(92)90054-G"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1137\/0213053"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1137\/0215025"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/11424826_67"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1021\/acs.nanolett.7b02118"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62214"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100287"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337028"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_15"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_8"},{"key":"ref61","first-page":"220","article-title":"Two halves make a whole","volume-title":"Advances in Cryptology\u2014EUROCRYPT","author":"Zahur","year":"2015"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10433-6_1"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511976667"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_29"},{"key":"ref65","article-title":"The trouble with quantum bit commitment","volume-title":"arXiv:quant-ph\/9603015","author":"Mayers","year":"1996"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.78.3414"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.78.3410"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1088\/2040-8978\/18\/1\/015202"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.89.052336"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.91.042306"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8121\/aa6a69"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_24"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_25"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1049\/qtc2.12010"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_16"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181975"},{"key":"ref77","article-title":"Quantum attacks on Bitcoin, and how to protect against them","volume-title":"arXiv:1710.10377","author":"Aggarwal","year":"2017"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms4418"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/18\/5\/055004"},{"key":"ref80","article-title":"On bit commitment and oblivious transfer in measurement-device independent settings","volume-title":"arXiv:2004.10515","author":"Ribeiro","year":"2020"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.89.015004"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ConfTELE50222.2021.9435473"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1364\/AOP.361502"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s11082-020-02622-z"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2019.8840330"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ConfTELE50222.2021.9435567"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1142\/s0219749908003256"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.22331\/q-2017-07-14-14"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54807-9_15"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-017-0300-0"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_5"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243786"},{"key":"ref93","volume-title":"MPC-Benchmark","year":"2021"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_35"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22174-8_3"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_14"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-018-03729-4"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.aba0959"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53008-5_13"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2014.149"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1080\/09500340410001730986"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.73.022320"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1080\/00107514.2016.1148333"},{"key":"ref105","article-title":"Device-independent oblivious transfer from the bounded-quantum-storage-model and computational assumptions","volume-title":"arXiv:2111.08595","author":"Broadbent","year":"2021"},{"key":"ref106","volume-title":"Hackers Delight","author":"Warren","year":"2012"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TEC.1959.5222693"},{"key":"ref108","first-page":"1","article-title":"ARM2GC: Succinct garbled processor for secure computation","volume-title":"Proc. 56th Annu. Design Autom. Conf.","author":"Songhori"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_21"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9036-8"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2018.2843136"},{"key":"ref113","volume-title":"ID Quantique Website","year":"2021"},{"key":"ref114","volume-title":"Gisaid Database","year":"2021"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkz268"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09732453.pdf?arnumber=9732453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:55:50Z","timestamp":1705535750000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9732453\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":115,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3158416","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}