{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:48:24Z","timestamp":1774122504901,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001742","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["682\/18"],"award-info":[{"award-number":["682\/18"]}],"id":[{"id":"10.13039\/501100001742","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3318041.3355462","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"132-146","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Semi-Quantum Money"],"prefix":"10.1145","author":[{"given":"Roy","family":"Radian","sequence":"first","affiliation":[{"name":"Computer Science Department, Ben-Gurion University of the Negev, Israel"}]},{"given":"Or","family":"Sattath","sequence":"additional","affiliation":[{"name":"Computer Science Department, Ben-Gurion University of the Negev, Israel"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2009.42"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.4086\/toc.2013.v009a009"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/795663.796361"},{"key":"e_1_3_2_1_4_1","unstructured":"Shalev Ben-David and Or Sattath. 2016. Quantum Tokens for Digital Signatures. (2016). arXiv:1609.09047  Shalev Ben-David and Or Sattath. 2016. Quantum Tokens for Digital Signatures. (2016). arXiv:1609.09047"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00038"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0157-4"},{"key":"e_1_3_2_1_7_1","volume-title":"Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings (Lecture Notes in Computer Science), Joe Kilian (Ed.)","volume":"3378","author":"Canetti Ran","year":"2005","unstructured":"Ran Canetti , Shai Halevi , and Michael Steiner . 2005 . Hardness Amplification of Weakly Verifiable Puzzles. In Theory of Cryptography , Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings (Lecture Notes in Computer Science), Joe Kilian (Ed.) , Vol. 3378 . Springer, 17--33. https:\/\/doi.org\/10.1007\/978-3-540-30576-7_2 10.1007\/978-3-540-30576-7_2 Ran Canetti, Shai Halevi, and Michael Steiner. 2005. Hardness Amplification of Weakly Verifiable Puzzles. In Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings (Lecture Notes in Computer Science), Joe Kilian (Ed.), Vol. 3378. Springer, 17--33. https:\/\/doi.org\/10.1007\/978-3-540-30576-7_2"},{"key":"e_1_3_2_1_8_1","volume-title":"Smart Contracts Meet Quantum Cryptography. (2019","author":"Coladangelo Andrea","year":"2019","unstructured":"Andrea Coladangelo . 2019 . Smart Contracts Meet Quantum Cryptography. (2019 ). arXiv:1902.05214 Andrea Coladangelo. 2019. Smart Contracts Meet Quantum Cryptography. (2019). arXiv:1902.05214"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0375-9601(82)90084-6"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090260"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1137\/18M1174726"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2012.10"},{"key":"e_1_3_2_1_13_1","volume-title":"New Constructions for Quantum Money. In 10th Conference on the Theory of Quantum Computation, Communication and Cryptography, TQC 2015","author":"Georgiou Marios","year":"2015","unstructured":"Marios Georgiou and Iordanis Kerenidis . 2015 . New Constructions for Quantum Money. In 10th Conference on the Theory of Quantum Computation, Communication and Cryptography, TQC 2015 , May 20-22, 2015, Brussels, Belgium. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 92--110. https:\/\/doi.org\/10.4230\/LIPIcs.TQC. 2015.92 10.4230\/LIPIcs.TQC.2015.92 Marios Georgiou and Iordanis Kerenidis. 2015. New Constructions for Quantum Money. In 10th Conference on the Theory of Quantum Computation, Communication and Cryptography, TQC 2015, May 20-22, 2015, Brussels, Belgium. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 92--110. https:\/\/doi.org\/10.4230\/LIPIcs.TQC.2015.92"},{"key":"e_1_3_2_1_14_1","volume-title":"Computationally-secure and composable remote state preparation. CoRR abs\/1904.06320","author":"Gheorghiu Alexandru","year":"2019","unstructured":"Alexandru Gheorghiu and Thomas Vidick . 2019. Computationally-secure and composable remote state preparation. CoRR abs\/1904.06320 ( 2019 ). arXiv:1904.06320 http:\/\/arxiv.org\/abs\/1904.06320 Alexandru Gheorghiu and Thomas Vidick. 2019. Computationally-secure and composable remote state preparation. CoRR abs\/1904.06320 (2019). arXiv:1904.06320 http:\/\/arxiv.org\/abs\/1904.06320"},{"key":"e_1_3_2_1_15_1","volume-title":"The Foundations of Cryptography -","author":"Goldreich Oded","unstructured":"Oded Goldreich . 2004. The Foundations of Cryptography - Vol. 2 , Basic Applications. Cambridge University Press . Oded Goldreich. 2004. The Foundations of Cryptography - Vol. 2, Basic Applications. Cambridge University Press."},{"key":"e_1_3_2_1_16_1","volume-title":"USA","volume":"10993","author":"Ji Zhengfeng","year":"2018","unstructured":"Zhengfeng Ji , Yi-Kai Liu , and Fang Song . 2018 . Pseudorandom Quantum States. In Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA , USA , August 19-23, 2018, Proceedings, Part III (Lecture Notes in Computer Science), Hovav Shacham and Alexandra Boldyreva (Eds.) , Vol. 10993 . Springer, 126--152. https:\/\/doi.org\/10.1007\/978-3-319-96878-0_5 arXiv:1711.00385 10.1007\/978-3-319-96878-0_5 Zhengfeng Ji, Yi-Kai Liu, and Fang Song. 2018. Pseudorandom Quantum States. In Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part III (Lecture Notes in Computer Science), Hovav Shacham and Alexandra Boldyreva (Eds.), Vol. 10993. Springer, 126--152. https:\/\/doi.org\/10.1007\/978-3-319-96878-0_5 arXiv:1711.00385"},{"key":"e_1_3_2_1_17_1","volume-title":"Introduction to Modern Cryptography","author":"Katz Jonathan","unstructured":"Jonathan Katz and Yehuda Lindell . 2014. Introduction to Modern Cryptography , Second Edition. CRC Press . Jonathan Katz and Yehuda Lindell. 2014. Introduction to Modern Cryptography, Second Edition. CRC Press."},{"key":"e_1_3_2_1_18_1","unstructured":"Andrew Lutomirski. 2011. Component Mixers and a Hardness Result for Counterfeiting Quantum Money. (2011). arXiv:1107.0321  Andrew Lutomirski. 2011. Component Mixers and a Hardness Result for Counterfeiting Quantum Money. (2011). arXiv:1107.0321"},{"key":"e_1_3_2_1_19_1","volume-title":"Tsinghua University","author":"Lutomirski Andrew","year":"2010","unstructured":"Andrew Lutomirski , Scott Aaronson , Edward Farhi , David Gosset , Jonathan A. Kelner , Avinatan Hassidim , and Peter W. Shor . 2010. Breaking and Making Quantum Money: Toward a New Quantum Cryptographic Protocol. In Innovations in Computer Science - ICS 2010 , Tsinghua University , Beijing, China , January 5-7, 2010 . Proceedings, Andrew Chi-Chih Yao (Ed.). Tsinghua University Press, 20--31. arXiv:0912.3825 Andrew Lutomirski, Scott Aaronson, Edward Farhi, David Gosset, Jonathan A. Kelner, Avinatan Hassidim, and Peter W. Shor. 2010. Breaking and Making Quantum Money: Toward a New Quantum Cryptographic Protocol. In Innovations in Computer Science - ICS 2010, Tsinghua University, Beijing, China, January 5-7, 2010. Proceedings, Andrew Chi-Chih Yao (Ed.). Tsinghua University Press, 20--31. arXiv:0912.3825"},{"key":"e_1_3_2_1_20_1","volume-title":"Classical Homomorphic Encryption for Quantum Circuits. In 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018","author":"Mahadev Urmila","year":"2018","unstructured":"Urmila Mahadev . 2018 . Classical Homomorphic Encryption for Quantum Circuits. In 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018 , Paris, France , October 7-9, 2018, Mikkel Thorup (Ed.). IEEE Computer Society, 332--338. https:\/\/doi.org\/10.1109\/FOCS.2018.00039 arXiv:1708.02130 10.1109\/FOCS.2018.00039 Urmila Mahadev. 2018. Classical Homomorphic Encryption for Quantum Circuits. In 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, October 7-9, 2018, Mikkel Thorup (Ed.). IEEE Computer Society, 332--338. https:\/\/doi.org\/10.1109\/FOCS.2018.00039 arXiv:1708.02130"},{"key":"e_1_3_2_1_21_1","volume-title":"Classical Verification of Quantum Computations. In 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018","author":"Mahadev Urmila","year":"2018","unstructured":"Urmila Mahadev . 2018 . Classical Verification of Quantum Computations. In 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018 , Paris, France , October 7-9, 2018, Mikkel Thorup (Ed.). IEEE Computer Society, 259--267. https:\/\/doi.org\/10.1109\/FOCS.2018.00033 arXiv:1804.01082 10.1109\/FOCS.2018.00033 Urmila Mahadev. 2018. Classical Verification of Quantum Computations. In 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, October 7-9, 2018, Mikkel Thorup (Ed.). IEEE Computer Society, 259--267. https:\/\/doi.org\/10.1109\/FOCS.2018.00033 arXiv:1804.01082"},{"key":"e_1_3_2_1_22_1","volume-title":"Theory of Quantum Computation, Communication, and Cryptography","author":"Molina Abel","unstructured":"Abel Molina , Thomas Vidick , and John Watrous . 2013. Optimal Counterfeiting Attacks and Generalizations for Wiesner's Quantum Money . In Theory of Quantum Computation, Communication, and Cryptography . Springer , 45--64. arXiv:1202.4010 Abel Molina, Thomas Vidick, and John Watrous. 2013. Optimal Counterfeiting Attacks and Generalizations for Wiesner's Quantum Money. In Theory of Quantum Computation, Communication, and Cryptography. Springer, 45--64. arXiv:1202.4010"},{"key":"e_1_3_2_1_23_1","first-page":"1295","article-title":"Quantum Coins. Contemp. Math., Vol. 523","volume":"0911","author":"Mosca Michele","year":"2010","unstructured":"Michele Mosca and Douglas Stebila . 2010 . Quantum Coins. Contemp. Math., Vol. 523 . Amer. Math. Soc., 35--47. https:\/\/doi.org\/10.1090\/conm\/523\/10311 arXiv : 0911 . 1295 10.1090\/conm Michele Mosca and Douglas Stebila. 2010. Quantum Coins. Contemp. Math., Vol. 523. Amer. Math. Soc., 35--47. https:\/\/doi.org\/10.1090\/conm\/523\/10311 arXiv:0911.1295","journal-title":"Amer. Math. Soc., 35--47. https:\/\/doi.org\/10.1090\/conm\/523\/10311 arXiv"},{"key":"e_1_3_2_1_24_1","volume-title":"Chuang","author":"Nielsen Michael A.","year":"2011","unstructured":"Michael A. Nielsen and Isaac L . Chuang . 2011 . Quantum Computation and Quantum Information: 10th Anniversary Edition (10th ed.). Cambridge University Press , New York, NY, USA. Michael A. Nielsen and Isaac L. Chuang. 2011. Quantum Computation and Quantum Information: 10th Anniversary Edition (10th ed.). Cambridge University Press, New York, NY, USA."},{"key":"e_1_3_2_1_25_1","volume-title":"The Concept of Transition in Quantum Mechanics. Foundations of Physics 1, 1 (01","author":"Park James L.","year":"1970","unstructured":"James L. Park . 1970. The Concept of Transition in Quantum Mechanics. Foundations of Physics 1, 1 (01 Mar 1970 ), 23--33. https:\/\/doi.org\/10.1007\/BF00708652 10.1007\/BF00708652 James L. Park. 1970. The Concept of Transition in Quantum Mechanics. Foundations of Physics 1, 1 (01 Mar 1970), 23--33. https:\/\/doi.org\/10.1007\/BF00708652"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1203552109"},{"key":"e_1_3_2_1_27_1","volume-title":"Jean-Charles Faug\u00e8re, Luis Hern\u00e1ndez Encinas, and Ludovic Perret.","author":"Pena Marta Conde","year":"2018","unstructured":"Marta Conde Pena , Raul Dur\u00e1n D\u00edaz , Jean-Charles Faug\u00e8re, Luis Hern\u00e1ndez Encinas, and Ludovic Perret. 2018 . Non-Quantum Cryptanalysis of the Noisy Version of Aaronson--Christiano's Quantum Money Scheme . (December 2018). https:\/\/doi.org\/10.1049\/iet-ifs.2018.5307 10.1049\/iet-ifs.2018.5307 Marta Conde Pena, Raul Dur\u00e1n D\u00edaz, Jean-Charles Faug\u00e8re, Luis Hern\u00e1ndez Encinas, and Ludovic Perret. 2018. Non-Quantum Cryptanalysis of the Noisy Version of Aaronson--Christiano's Quantum Money Scheme. (December 2018). https:\/\/doi.org\/10.1049\/iet-ifs.2018.5307"},{"key":"e_1_3_2_1_28_1","volume-title":"arXiv:1908.08889","author":"Radian Roy","year":"2019","unstructured":"Roy Radian and Or Sattath . 2019. Semi-Quantum Money . ( 2019 ). arXiv:1908.08889 Roy Radian and Or Sattath. 2019. Semi-Quantum Money. (2019). arXiv:1908.08889"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1137\/090747270"},{"key":"e_1_3_2_1_31_1","unstructured":"Yuuki Tokunaga Taisuaki Okamoto and Nobuyuki Imoto. 2003. Anonymous Quantum Cash. (2003). http:\/\/qci.is.s.u-tokyo.ac.jp\/qci\/eqis03\/program\/papers\/O09-Tokunaga.ps.gz  Yuuki Tokunaga Taisuaki Okamoto and Nobuyuki Imoto. 2003. Anonymous Quantum Cash. (2003). http:\/\/qci.is.s.u-tokyo.ac.jp\/qci\/eqis03\/program\/papers\/O09-Tokunaga.ps.gz"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310974"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008920"},{"key":"e_1_3_2_1_34_1","volume-title":"A Single Quantum Cannot be Cloned. Nature 299, 5886","author":"Wootters William K","year":"1982","unstructured":"William K Wootters and Wojciech H Zurek . 1982. A Single Quantum Cannot be Cloned. Nature 299, 5886 ( 1982 ), 802--803. William K Wootters and Wojciech H Zurek. 1982. A Single Quantum Cannot be Cloned. Nature 299, 5886 (1982), 802--803."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_14"}],"event":{"name":"AFT '19: 1st ACM Conference on Advances in Financial Technologies","location":"Zurich Switzerland","acronym":"AFT '19","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 1st ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355462","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318041.3355462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:33Z","timestamp":1750268973000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":34,"alternative-id":["10.1145\/3318041.3355462","10.1145\/3318041"],"URL":"https:\/\/doi.org\/10.1145\/3318041.3355462","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}