{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T05:24:26Z","timestamp":1743571466083,"version":"3.37.3"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,2,11]],"date-time":"2021-02-11T00:00:00Z","timestamp":1613001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2021,2,11]],"date-time":"2021-02-11T00:00:00Z","timestamp":1613001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund (FEDER)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,2,11]]},"DOI":"10.1109\/conftele50222.2021.9435479","type":"proceedings-article","created":{"date-parts":[[2021,5,27]],"date-time":"2021-05-27T00:22:31Z","timestamp":1622074951000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Quantum Secure Multiparty Computation of Phylogenetic Trees of SARS-CoV-2 Genome"],"prefix":"10.1109","author":[{"given":"Manuel B.","family":"Santos","sequence":"first","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es,Lisboa,Portugal"}]},{"given":"Ana C.","family":"Gomes","sequence":"additional","affiliation":[{"name":"CBRA Genomics,Coimbra,Portugal"}]},{"given":"Armando N.","family":"Pinto","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es,Aveiro,Portugal"}]},{"given":"Paulo","family":"Mateus","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es,Lisboa,Portugal"}]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/BF01890115"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22174-8_3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-5934-7_17"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335755"},{"key":"ref13","first-page":"1","article-title":"Completeness Theorems for Non-Cryptographic Fault- Tolerant Distributed Computation (Extended Abstract)","author":"ben-or","year":"1988","journal-title":"Proceedings of the 20th Annual ACM Symposium on Theory of Computing"},{"key":"ref14","first-page":"503","article-title":"The Round Complexity of Secure Protocols (Ex-tended Abstract)","author":"beaver","year":"1990","journal-title":"Proceedings of the 22nd Annual ACM Symposium on Theory of Computing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2019.i2.55-93"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/nature23461"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73012"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"journal-title":"Bar Ilan University Cryptography Research Group","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1126\/science.1229566"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54807-9_15"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1561\/3300000019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_35"},{"key":"ref5","article-title":"A Guide to Fully Homomorphic Encryption","author":"armknecht","year":"2015","journal-title":"Cryptology ePrint Archive Report 2015\/1192"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.virusres.2020.198098"},{"key":"ref7","first-page":"1","article-title":"Quantum Enabled Private Recognition of Composite Signals in Genome and Proteins. International Conference of Transparent Optical Network","volume":"1","author":"pinto","year":"2020","journal-title":"ICTON"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/s41579-018-0118-9"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/jmv.25794"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2004999117"},{"key":"ref20","first-page":"417","article-title":"Use of elliptic curves in cryptography","volume":"85","author":"miller","year":"1985","journal-title":"CRYPTO Lecture Notes in Computer Science"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/359460.359473"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.81.1301"},{"key":"ref23","first-page":"8","article-title":"Quantum cryptography: Public key distribution and coin tossing","volume":"175","author":"bennett","year":"1984","journal-title":"Proceedings of IEEE International Conference on Computers Systems and Signal Processing"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.83.022301"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/app10124080"}],"event":{"name":"2021 Telecoms Conference (ConfTELE)","start":{"date-parts":[[2021,2,11]]},"location":"Leiria, Portugal","end":{"date-parts":[[2021,2,12]]}},"container-title":["2021 Telecoms Conference (ConfTELE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9435429\/9435422\/09435479.pdf?arnumber=9435479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:19:24Z","timestamp":1659485964000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9435479\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,11]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/conftele50222.2021.9435479","relation":{},"subject":[],"published":{"date-parts":[[2021,2,11]]}}}