{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:47:46Z","timestamp":1774122466599,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T00:00:00Z","timestamp":1592784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,22]]},"DOI":"10.1145\/3357713.3384304","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T01:45:25Z","timestamp":1591494325000},"page":"255-268","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["One-shot signatures and applications to hybrid quantum\/classical authentication"],"prefix":"10.1145","author":[{"given":"Ryan","family":"Amos","sequence":"first","affiliation":[{"name":"Princeton University, USA"}]},{"given":"Marios","family":"Georgiou","sequence":"additional","affiliation":[{"name":"City University of New York, USA"}]},{"given":"Aggelos","family":"Kiayias","sequence":"additional","affiliation":[{"name":"University of Edinburgh, UK"}]},{"given":"Mark","family":"Zhandry","sequence":"additional","affiliation":[{"name":"Princeton University, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2009.42"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.4086\/toc.2013.v009a009"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Divesh Aggarwal Gavin K Brennen Troy Lee Miklos Santha and Marco Tomamichel. 2017. Quantum attacks on Bitcoin and how to protect against them. arXiv preprint arXiv:1710.10377 ( 2017 ).  Divesh Aggarwal Gavin K Brennen Troy Lee Miklos Santha and Marco Tomamichel. 2017. Quantum attacks on Bitcoin and how to protect against them. arXiv preprint arXiv:1710.10377 ( 2017 ).","DOI":"10.5195\/ledger.2018.127"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.2002.1826"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.57"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243848"},{"key":"e_1_3_2_1_7_1","volume-title":"Theory of Cryptography","author":"Bartusek James","unstructured":"James Bartusek , Jiaxin Guan , Fermi Ma , and Mark Zhandry . 2018. Return of GGH15: Provable Security Against Zeroizing Attacks . In Theory of Cryptography , Amos Beimel and Stefan Dziembowski (Eds.). Springer International Publishing , Cham , 544-574. James Bartusek, Jiaxin Guan, Fermi Ma, and Mark Zhandry. 2018. Return of GGH15: Provable Security Against Zeroizing Attacks. In Theory of Cryptography, Amos Beimel and Stefan Dziembowski (Eds.). Springer International Publishing, Cham, 544-574."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/502090.502097"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_34"},{"key":"e_1_3_2_1_10_1","unstructured":"Shalev Ben-David and Or Sattath. 2017. Quantum Tokens for Digital Signatures. IACR Cryptology ePrint Archive 2017 ( 2017 ) 94. http:\/\/eprint.iacr.org\/ 2017 \/094  Shalev Ben-David and Or Sattath. 2017. Quantum Tokens for Digital Signatures. IACR Cryptology ePrint Archive 2017 ( 2017 ) 94. http:\/\/eprint.iacr.org\/ 2017 \/094"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00038"},{"key":"e_1_3_2_1_13_1","unstructured":"Vitalik Buterin. 2014. Long-Range Attacks: The Serious Problem With Adaptive Proof of Work. https:\/\/blog.ethereum.org\/ 2014 \/05\/15\/long-range-attacks-theserious-problem-with-adaptive-proof-of-work\/.  Vitalik Buterin. 2014. Long-Range Attacks: The Serious Problem With Adaptive Proof of Work. https:\/\/blog.ethereum.org\/ 2014 \/05\/15\/long-range-attacks-theserious-problem-with-adaptive-proof-of-work\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.02.001"},{"key":"e_1_3_2_1_15_1","unstructured":"Alexandru Cojocaru Juan A. Garay Aggelos Kiayias Fang Song and Petros Wallden. 2019. The Bitcoin Backbone Protocol Against Quantum Adversaries. IACR Cryptology ePrint Archive 2019 ( 2019 ) 1150. https:\/\/eprint.iacr.org\/ 2019 \/ 1150  Alexandru Cojocaru Juan A. Garay Aggelos Kiayias Fang Song and Petros Wallden. 2019. The Bitcoin Backbone Protocol Against Quantum Adversaries. IACR Cryptology ePrint Archive 2019 ( 2019 ) 1150. https:\/\/eprint.iacr.org\/ 2019 \/ 1150"},{"key":"e_1_3_2_1_16_1","unstructured":"Roger Colbeck. 2009. Quantum and relativistic protocols for secure multi-party computation. arXiv preprint arXiv:0911.3814 ( 2009 ).  Roger Colbeck. 2009. Quantum and relativistic protocols for secure multi-party computation. arXiv preprint arXiv:0911.3814 ( 2009 )."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-79063-3_9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_30"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17656-3_11"},{"key":"e_1_3_2_1_21_1","volume-title":"Quantum state restoration and single-copy tomography for ground states of hamiltonians. Physical review letters 105, 19 ( 2010 )","author":"Farhi Edward","year":"1905","unstructured":"Edward Farhi , David Gosset , Avinatan Hassidim , Andrew Lutomirski , Daniel Nagaj , and Peter Shor . 2010. Quantum state restoration and single-copy tomography for ground states of hamiltonians. Physical review letters 105, 19 ( 2010 ) , 1905 03. Edward Farhi, David Gosset, Avinatan Hassidim, Andrew Lutomirski, Daniel Nagaj, and Peter Shor. 2010. Quantum state restoration and single-copy tomography for ground states of hamiltonians. Physical review letters 105, 19 ( 2010 ), 190503."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_12"},{"key":"e_1_3_2_1_23_1","unstructured":"Hal Finney. 2004. Reusable Proofs of Work. https:\/\/web.archive.org\/web\/ 20071222072154\/http:\/\/rpow.net\/.  Hal Finney. 2004. Reusable Proofs of Work. https:\/\/web.archive.org\/web\/ 20071222072154\/http:\/\/rpow.net\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2006.010822"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63715-0_12"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2012.10"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00015"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_3"},{"key":"e_1_3_2_1_29_1","volume-title":"Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. Cryptology ePrint Archive, Report 2016 \/889","author":"Kiayias Aggelos","year":"2016","unstructured":"Aggelos Kiayias , Alexander Russell , Bernardo David , and Roman Oliynykov . 2016 . Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. Cryptology ePrint Archive, Report 2016 \/889 . http:\/\/eprint.iacr.org\/ 2016 \/889. Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2016. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. Cryptology ePrint Archive, Report 2016 \/889. http:\/\/eprint.iacr.org\/ 2016 \/889."},{"key":"e_1_3_2_1_30_1","first-page":"108","article-title":"Chameleon hashing and signatures","volume":"6","author":"Krawczyk Hugo Mario","year":"2000","unstructured":"Hugo Mario Krawczyk and Tal D Rabin . 2000 . Chameleon hashing and signatures . US Patent 6 , 108 , 783. Hugo Mario Krawczyk and Tal D Rabin. 2000. Chameleon hashing and signatures. US Patent 6, 108, 783.","journal-title":"US Patent"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_12"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00033"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_19"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_21"},{"key":"e_1_3_2_1_36_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. ( 2008 ).","author":"Satoshi Nakamoto","year":"2008","unstructured":"Satoshi Nakamoto et al. 2008 . Bitcoin: A peer-to-peer electronic cash system. ( 2008 ). Satoshi Nakamoto et al. 2008. Bitcoin: A peer-to-peer electronic cash system. ( 2008 )."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73011"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.72.042309"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355462"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_6"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_18"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008920"},{"key":"e_1_3_2_1_44_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. 2014 . Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 , 2014 ( 2014 ), 1-32. Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 ( 2014 ), 1-32."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_14"}],"event":{"name":"STOC '20: 52nd Annual ACM SIGACT Symposium on Theory of Computing","location":"Chicago IL USA","acronym":"STOC '20","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357713.3384304","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357713.3384304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:12Z","timestamp":1750200072000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357713.3384304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,22]]},"references-count":44,"alternative-id":["10.1145\/3357713.3384304","10.1145\/3357713"],"URL":"https:\/\/doi.org\/10.1145\/3357713.3384304","relation":{},"subject":[],"published":{"date-parts":[[2020,6,22]]},"assertion":[{"value":"2020-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}