{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T05:49:04Z","timestamp":1771480144748,"version":"3.50.1"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","issue":"11","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Cyber Security Research Center at Ben-Gurion University"},{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["682\/18 and 2137\/19"],"award-info":[{"award-number":["682\/18 and 2137\/19"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2023,11]]},"abstract":"<jats:p>In memory of Stephen Wiesner, 1942--2021.<\/jats:p>","DOI":"10.1145\/3576897","type":"journal-article","created":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T08:53:09Z","timestamp":1696927989000},"page":"78-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Uncloneable Cryptography"],"prefix":"10.1145","volume":"66","author":[{"given":"Or","family":"Sattath","sequence":"first","affiliation":[{"name":"Ben-Gurion University of the Negev in Beersheba, Israel"}]}],"member":"320","published-online":{"date-parts":[[2023,10,20]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2009.42"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.4086\/toc.2013.v009a009"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84242-0_19"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2007.26"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357713.3384304"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90459-3_11"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77886-6_17"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of Advances in Cryptology (Santa Barbara, CA, USA, Aug. 15--18","author":"Ananth P.","year":"2022","unstructured":"Ananth, P. et al. Cryptography from pseudorandom quantum states. In Proceedings of Advances in Cryptology (Santa Barbara, CA, USA, Aug. 15--18, 2022), LNCS 13507. Y. Dodis, and T. Shrimpton, (eds), Springer, 208--236; arXiv:2112.10020."},{"key":"e_1_2_1_10_1","volume-title":"Paper 2023\/877, (2023)","author":"Barooti K.","year":"2023","unstructured":"Barooti, K. et al. Public-key encryption with quantum keys. Cryptology ePrint Archive, Paper 2023\/877, (2023); https:\/\/eprint.iacr.org\/2023\/877."},{"key":"e_1_2_1_11_1","volume-title":"Almost public coins. (2020)","author":"Behera A.","year":"2002","unstructured":"Behera, A., and Sattath, O. Almost public coins. (2020); arXiv:2002.12438."},{"key":"e_1_2_1_12_1","unstructured":"Behera A. et al. Noise-tolerant quantum tokens for MAC. (2021); arXiv:2105.05016."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1609.09047"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/0213053"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36030-6_10"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.22331\/q-2021-04-08-429"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 17th Annual Intern. Conf. on Cryptology","author":"Broadbent A.","year":"2013","unstructured":"Broadbent, A. et al. Quantum one-time programs (extended abstract). In Proceedings of the 17th Annual Intern. Conf. on Cryptology (Santa Barbara, CA, USA, Aug. 18--22, 2013), LNCS, 8043. R. Canetti, and Garay, J.A. (eds). Springer, 344--360; http:\/\/eprint.iacr.org\/2013\/343, arXiv:1211.1080."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64381-2_4"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.TQC.2020.4"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.57.2368"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography3030022"},{"key":"e_1_2_1_23_1","volume-title":"Paper 2023\/282, (2023)","author":"Coladangelo A.","year":"2023","unstructured":"Coladangelo, A. Quantum trapdoor functions from classical one-way functions. Cryptology ePrint Archive, Paper 2023\/282, (2023); https:\/\/eprint.iacr.org\/2023\/282."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84242-0_20"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.22331\/q-2020-07-16-297"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.80.012304"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/0375-9601(82)90084-6"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090260"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2012.10"},{"key":"e_1_2_1_30_1","volume-title":"Paper 2020\/877 (2020)","author":"Georgiou M.","year":"2020","unstructured":"Georgiou, M., and Zhandry, M. Unclonable decryption keys. Cryptology ePrint Archive, Paper 2020\/877 (2020); https:\/\/eprint.iacr.org\/2020\/877."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_3"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.26421\/QIC3.6-2"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92062-3_21"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_5"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.TQC.2021.2"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35656-8_4"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15802-5_10"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/523\/10311"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00708652"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1203552109"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5307"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-021-09418-8"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92062-3_19"},{"key":"e_1_2_1_45_1","unstructured":"Sattath O. and Wyborski S. Uncloneable decryptors from quantum copy-protection. (2022); arXiv:2203.05866."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519935.3519952"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15802-5_11"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2817206"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.58.1827"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008920"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1038\/299802a0"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-020-09372-x"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576897","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:47Z","timestamp":1750178207000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576897"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":51,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["10.1145\/3576897"],"URL":"https:\/\/doi.org\/10.1145\/3576897","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,20]]},"assertion":[{"value":"2023-10-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}