{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T23:12:43Z","timestamp":1775085163772,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,1,9]],"date-time":"2013-01-09T00:00:00Z","timestamp":1357689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,1,9]]},"DOI":"10.1145\/2422436.2422455","type":"proceedings-article","created":{"date-parts":[[2013,1,3]],"date-time":"2013-01-03T12:58:22Z","timestamp":1357217902000},"page":"145-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["The garden-hose model"],"prefix":"10.1145","author":[{"given":"Harry","family":"Buhrman","sequence":"first","affiliation":[{"name":"CWI, University of Amsterdam, Amsterdam, Netherlands"}]},{"given":"Serge","family":"Fehr","sequence":"additional","affiliation":[{"name":"Centrum Wiskunde &amp; Informatica (CWI), Amsterdam, Netherlands"}]},{"given":"Christian","family":"Schaffner","sequence":"additional","affiliation":[{"name":"University of Amsterdam, CWI, Amsterdam, Netherlands"}]},{"given":"Florian","family":"Speelman","sequence":"additional","affiliation":[{"name":"CWI, University of Amsterdam, Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2013,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.15"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/13\/9\/093036"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/188307.188361"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2422436.2422456"},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/978-3-642-22792-9_24","volume-title":"Advances in Cryptology - CRYPTO","author":"Buhrman H.","year":"2011","unstructured":"H. Buhrman , N. Chandran , S. Fehr , R. Gelles , V. Goyal , R. Ostrovsky , and C. Schaffner . Position-based quantum cryptography: Impossibility and constructions . In P. Rogaway, editor, Advances in Cryptology - CRYPTO 2011 , volume 6841 of Lecture Notes in Computer Science , pages 429 -- 446 . Springer Berlin \/ Heidelberg , 2011. H. Buhrman, N. Chandran, S. Fehr, R. Gelles, V. Goyal, R. Ostrovsky, and C. Schaffner. Position-based quantum cryptography: Impossibility and constructions. In P. Rogaway, editor, Advances in Cryptology - CRYPTO 2011, volume 6841 of Lecture Notes in Computer Science, pages 429--446. Springer Berlin \/ Heidelberg, 2011."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276713"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.302"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498470"},{"key":"e_1_3_2_1_10_1","volume-title":"May","author":"Chandran N.","year":"2010","unstructured":"N. Chandran , S. Fehr , R. Gelles , V. Goyal , and R. Ostrovsky . Position-based quantum cryptography. arXiv:1005.1750v2 , May 2010 . N. Chandran, S. Fehr, R. Gelles, V. Goyal, and R. Ostrovsky. Position-based quantum cryptography. arXiv:1005.1750v2, May 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_23"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217015"},{"key":"e_1_3_2_1_13_1","first-page":"61","volume-title":"QCQC '98","author":"Cleve R.","year":"1998","unstructured":"R. Cleve , W. v. Dam , M. Nielsen , and A. Tapp . Quantum entanglement and the communication complexity of the inner product function. In Selected papers from the First NASA International Conference on Quantum Computing and Quantum Communications , QCQC '98 , pages 61 -- 74 . Springer-Verlag , 1998 . R. Cleve, W. v. Dam, M. Nielsen, and A. Tapp. Quantum entanglement and the communication complexity of the inner product function. In Selected papers from the First NASA International Conference on Quantum Computing and Quantum Communications, QCQC '98, pages 61--74. Springer-Verlag, 1998."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250866"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.101.240501"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.79.042306"},{"key":"e_1_3_2_1_17_1","volume-title":"Tagging systems","author":"Kent A.","year":"2006","unstructured":"A. Kent , W. Munro , T. Spiller , and R. Beausoleil . Tagging systems , 2006 . US patent nr 2006\/0022832. A. Kent, W. Munro, T. Spiller, and R. Beausoleil. Tagging systems, 2006. US patent nr 2006\/0022832."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.84.012326"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/791230.792280"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.83.012322"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.81.042319"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684009"},{"key":"e_1_3_2_1_23_1","volume-title":"Mage - the CDCL SAT solver developed and used by IBM for formal verification http:\/\/ibm.co\/P7qNpC. personal communication","author":"Margalit O.","year":"2012","unstructured":"O. Margalit and A. Matsliah . Mage - the CDCL SAT solver developed and used by IBM for formal verification http:\/\/ibm.co\/P7qNpC. personal communication , 2012 . O. Margalit and A. Matsliah. Mage - the CDCL SAT solver developed and used by IBM for formal verification http:\/\/ibm.co\/P7qNpC. personal communication, 2012."},{"key":"e_1_3_2_1_24_1","volume-title":"Quantum Computation and Quantum Information","author":"Nielsen M. A.","year":"2000","unstructured":"M. A. Nielsen and I. L. Chuang . Quantum Computation and Quantum Information . Cambridge university press , 2000 . M. A. Nielsen and I. L. Chuang. Quantum Computation and Quantum Information. Cambridge university press, 2000."},{"key":"e_1_3_2_1_25_1","volume-title":"personal communication","author":"Pietrzak K.","year":"2011","unstructured":"K. Pietrzak . personal communication , 2011 . K. Pietrzak. personal communication, 2011."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1070\/IM2003v067n01ABEH000422"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941313"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2005.1542879"},{"key":"e_1_3_2_1_29_1","volume-title":"Master's thesis","author":"Speelman F.","year":"2011","unstructured":"F. Speelman . Position-based quantum cryptography and the garden-hose game. Master's thesis , University of Amsterdam , 2011 . arxiv:1210.4353. F. Speelman. Position-based quantum cryptography and the garden-hose game. Master's thesis, University of Amsterdam, 2011. arxiv:1210.4353."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11516798_27"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.863855"}],"event":{"name":"ITCS '13: Innovations in Theoretical Computer Science","location":"Berkeley California USA","acronym":"ITCS '13","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the 4th conference on Innovations in Theoretical Computer Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2422436.2422455","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2422436.2422455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:14Z","timestamp":1750277654000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2422436.2422455"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,9]]},"references-count":30,"alternative-id":["10.1145\/2422436.2422455","10.1145\/2422436"],"URL":"https:\/\/doi.org\/10.1145\/2422436.2422455","relation":{},"subject":[],"published":{"date-parts":[[2013,1,9]]},"assertion":[{"value":"2013-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}