{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T04:52:23Z","timestamp":1778215943545,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,5,19]],"date-time":"2012-05-19T00:00:00Z","timestamp":1337385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,5,19]]},"DOI":"10.1145\/2213977.2213983","type":"proceedings-article","created":{"date-parts":[[2012,5,21]],"date-time":"2012-05-21T15:20:35Z","timestamp":1337613635000},"page":"41-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":107,"title":["Quantum money from hidden subspaces"],"prefix":"10.1145","author":[{"given":"Scott","family":"Aaronson","sequence":"first","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"Paul","family":"Christiano","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,5,19]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509999"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.4086\/toc.2005.v001a001"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2009.42"},{"key":"e_1_3_2_2_4_1","unstructured":"S. Aaronson. On the security of private-key quantum money 2011. In preparation.  S. Aaronson. On the security of private-key quantum money 2011. In preparation."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.4086\/toc.2007.v003a007"},{"key":"e_1_3_2_2_6_1","first-page":"57","article-title":"Cold boot key recovery by solving polynomial systems with noise. In J. Lopez and G. Tsudik, ed., Applied Cryptography and Network Security 2011","volume":"6715","author":"Albrecht M.","year":"2011","journal-title":"LNCS"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/314613.315014"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.2002.1826"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2011.24"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704152"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/502090.502097"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539796300933"},{"key":"e_1_3_2_2_13_1","first-page":"175","volume-title":"Proc. IEEE Int. Conf. on Computers Systems and Signal Proc.","author":"Bennett C. H.","year":"1984"},{"key":"e_1_3_2_2_14_1","first-page":"267","volume-title":"CRYPTO","author":"Bennett C. H.","year":"1982"},{"key":"e_1_3_2_2_15_1","volume-title":"Dover, 2010","author":"Bohr N.","year":"1961"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_3"},{"key":"e_1_3_2_2_17_1","first-page":"473","volume-title":"Public Key Cryptography","author":"Bouillaguet C.","year":"2011"},{"key":"e_1_3_2_2_18_1","volume-title":"AMS","author":"Brassard G.","year":"2002"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11538462_21"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_6"},{"issue":"190503","key":"e_1_3_2_2_21_1","first-page":"0912","article-title":"Quantum state restoration and single-copy tomography","volume":"105","author":"Farhi E.","year":"2010","journal-title":"Phys. Rev. Lett."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090260"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"D. Gavinsky. Quantum money with classical verification. arXiv:1109.0372 2011.  D. Gavinsky. Quantum money with classical verification. arXiv:1109.0372 2011.","DOI":"10.1109\/CCC.2012.10"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-003-0025-5"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"e_1_3_2_2_26_1","unstructured":"C. Hillar and L.-H. Lim. Most tensor problems are NP hard 2009. arXiv:0911.1393.  C. Hillar and L.-H. Lim. Most tensor problems are NP hard 2009. arXiv:0911.1393."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.75"},{"key":"e_1_3_2_2_28_1","unstructured":"A. Lutomirski. An online attack against Wiesner's quantum money. arXiv:1010.0256 2010.  A. Lutomirski. An online attack against Wiesner's quantum money. arXiv:1010.0256 2010."},{"key":"e_1_3_2_2_29_1","unstructured":"A. Lutomirski. Component mixers and a hardness result for counterfeiting quantum money. arXiv:1107.0321 2011.  A. Lutomirski. Component mixers and a hardness result for counterfeiting quantum money. arXiv:1107.0321 2011."},{"key":"e_1_3_2_2_30_1","first-page":"20","volume-title":"ITCS","author":"Lutomirski A.","year":"2010"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"A. Molina T. Vidick and J. Watrous. Optimal counterfeiting attacks and generalizations for Wiesner's quantum money. arXiv:1202.4010 2012.  A. Molina T. Vidick and J. Watrous. Optimal counterfeiting attacks and generalizations for Wiesner's quantum money. arXiv:1202.4010 2012.","DOI":"10.1007\/978-3-642-35656-8_4"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/523\/10311"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73011"},{"key":"e_1_3_2_2_34_1","volume-title":"Cambridge","author":"Nielsen M.","year":"2000"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054126"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100269"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2011691.2011693"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008920"}],"event":{"name":"STOC'12: Symposium on Theory of Computing","location":"New York New York USA","acronym":"STOC'12","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the forty-fourth annual ACM symposium on Theory of computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2213977.2213983","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2213977.2213983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:20:54Z","timestamp":1750238454000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2213977.2213983"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,19]]},"references-count":39,"alternative-id":["10.1145\/2213977.2213983","10.1145\/2213977"],"URL":"https:\/\/doi.org\/10.1145\/2213977.2213983","relation":{},"subject":[],"published":{"date-parts":[[2012,5,19]]},"assertion":[{"value":"2012-05-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}