{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:16:36Z","timestamp":1766600196802,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3450317","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"293-295","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Quantum Obfuscation"],"prefix":"10.1145","author":[{"given":"Vivek","family":"Balachandran","sequence":"first","affiliation":[{"name":"Singapore Institute of Technology, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"184","article-title":"Manufacturing cheap, resilient, and stealthy opaque constructs","volume":"25","author":"Collberg C.","year":"1998","unstructured":"C. Collberg , C. Thomborson , and D. Low , \" Manufacturing cheap, resilient, and stealthy opaque constructs ,\" in ACM Symposium on Principles of Programming Languages , 1998 , vol. 25 , pp. 184 -- 196 . C. Collberg, C. Thomborson, and D. Low, \"Manufacturing cheap, resilient, and stealthy opaque constructs,\" in ACM Symposium on Principles of Programming Languages, 1998, vol. 25, pp. 184--196.","journal-title":"ACM Symposium on Principles of Programming Languages"},{"key":"e_1_3_2_2_2_1","volume-title":"IEEE","author":"Emmanuel Sabu","year":"2014","unstructured":"Balachandran, Vivek, Sabu Emmanuel , and Ng Wee Keong . \"Obfuscation by code fragmentation to evade reverse engineering.\" In 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 463--469 . IEEE , 2014 . Balachandran, Vivek, Sabu Emmanuel, and Ng Wee Keong. \"Obfuscation by code fragmentation to evade reverse engineering.\" In 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 463--469. IEEE, 2014."},{"key":"e_1_3_2_2_3_1","first-page":"146","article-title":"AEON: android encryption based obfuscation","author":"Ying Tan Li","year":"2018","unstructured":"Geethanjali, D., Tan Li Ying , Chua Wan Jun Melissa , and Vivek Balachandran . \" AEON: android encryption based obfuscation .\" In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy , pp. 146 -- 148 . 2018 . Geethanjali, D., Tan Li Ying, Chua Wan Jun Melissa, and Vivek Balachandran. \"AEON: android encryption based obfuscation.\" In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 146--148. 2018.","journal-title":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"},{"issue":"3","key":"e_1_3_2_2_4_1","first-page":"676","article-title":"Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation","volume":"12","author":"Xu Chunxiang","year":"2016","unstructured":"Zhang, Yuan, Chunxiang Xu , Xiaohui Liang , Hongwei Li , Yi Mu , and Xiaojun Zhang . \" Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation .\" IEEE Transactions on Information Forensics and Security 12 , no. 3 ( 2016 ): 676 -- 688 . Zhang, Yuan, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, and Xiaojun Zhang. \"Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation.\" IEEE Transactions on Information Forensics and Security 12, no. 3 (2016): 676--688.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-019-03213-z"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.23.880"},{"key":"e_1_3_2_2_7_1","volume-title":"https:\/\/github.com\/vivekianity\/quantum-opaque-predicate\/blob\/main\/CHSH-obfuscation-opaque%20predicate.ipynb (last accessed","author":"Quantum Opaque Predicate Github","year":"2020","unstructured":"Github code for Quantum Opaque Predicate , https:\/\/github.com\/vivekianity\/quantum-opaque-predicate\/blob\/main\/CHSH-obfuscation-opaque%20predicate.ipynb (last accessed 5 Dec 2020 ) Github code for Quantum Opaque Predicate, https:\/\/github.com\/vivekianity\/quantum-opaque-predicate\/blob\/main\/CHSH-obfuscation-opaque%20predicate.ipynb (last accessed 5 Dec 2020)"},{"key":"e_1_3_2_2_8_1","unstructured":"Michael Lachenmaier and Marco Michel ?Classical vs. Quantum Correlations\" https:\/\/www-m5.ma.tum.de\/foswiki\/pub\/M5\/Allgemeines\/OS_QIT_2016S\/Vortrag7.pdf June 2016  Michael Lachenmaier and Marco Michel ?Classical vs. Quantum Correlations\" https:\/\/www-m5.ma.tum.de\/foswiki\/pub\/M5\/Allgemeines\/OS_QIT_2016S\/Vortrag7.pdf June 2016"},{"key":"e_1_3_2_2_9_1","unstructured":"Qiskit https:\/\/qiskit.org\/  Qiskit https:\/\/qiskit.org\/"},{"key":"e_1_3_2_2_10_1","first-page":"156","article-title":"Gramac: A graph based android malware classification mechanism","author":"Balachandran Vivek","year":"2020","unstructured":"Vij, Devyani, Vivek Balachandran , Tony Thomas , and Roopak Surendran . \" Gramac: A graph based android malware classification mechanism .\" In Proceedings of the tenth ACM conference on data and application security and privacy , pp. 156 -- 158 . 2020 . Vij, Devyani, Vivek Balachandran, Tony Thomas, and Roopak Surendran. \"Gramac: A graph based android malware classification mechanism.\" In Proceedings of the tenth ACM conference on data and application security and privacy, pp. 156--158. 2020.","journal-title":"Proceedings of the tenth ACM conference on data and application security and privacy"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3450317","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3450317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3450317"}},"subtitle":["Quantum Predicates with Entangled qubits"],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":10,"alternative-id":["10.1145\/3422337.3450317","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3450317","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}