{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:08:39Z","timestamp":1772039319564,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3733817.3762700","type":"proceedings-article","created":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T16:47:28Z","timestamp":1766594848000},"page":"10-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["ObfusQate: Unveiling the First Quantum Program Obfuscation Framework"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-3351-7710","authenticated-orcid":false,"given":"Nikhil","family":"Bartake","sequence":"first","affiliation":[{"name":"Singapore Institute of Technology, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6092-7316","authenticated-orcid":false,"given":"See Toh Zi","family":"Jie","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6665-0643","authenticated-orcid":false,"given":"Carmen Wong","family":"Jiawen","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9319-0622","authenticated-orcid":false,"given":"Declan Fong Yi","family":"Ren","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5086-1391","authenticated-orcid":false,"given":"Michael","family":"Kasper","sequence":"additional","affiliation":[{"name":"Fraunhofer Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4847-7150","authenticated-orcid":false,"given":"Vivek","family":"Balachandran","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2025,12,24]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"Ronald\u00a0L. Rivest Adi Shamir and Leonard Adleman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21 2 (Feb. 1978) 120\u2013126. 10.1145\/359340.359342","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Peter\u00a0W. Shor. 1997. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM J. Comput. 26 5 (1997) 1484\u20131509. 10.1137\/S0097539795293172","DOI":"10.1137\/S0097539795293172"},{"key":"e_1_3_3_1_4_2","unstructured":"Gorjan Alagic and Bill Fefferman. 2016. On quantum obfuscation. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1602.01771 (2016). https:\/\/doi.org\/10.48550\/arXiv.1602.01771."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53015-3_1"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148407"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3422337.3450317"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3618260.3649673"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ITCS.2022.15"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3564246.3585179"},{"key":"e_1_3_3_1_11_2","unstructured":"Subrata Das and Swaroop Ghosh. 2023. Randomized Reversible Gate-Based Obfuscation for Secured Compilation of Quantum Circuit. ArXiv abs\/2305.01133 (2023). https:\/\/api.semanticscholar.org\/CorpusID:258437030."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Subrata Das and Swaroop Ghosh. 2024. Secure Quantum Circuit Compilation Methodology for Untrusted Compilers. Research Square (2024). https:\/\/doi.org\/10.21203\/rs.3.rs-3849459\/v1.","DOI":"10.21203\/rs.3.rs-3849459\/v1"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3505253.3505260"},{"key":"e_1_3_3_1_14_2","first-page":"213","volume-title":"International Conference on Information Systems Security","author":"Quan Lee\u00a0Jun","year":"2024","unstructured":"Lee\u00a0Jun Quan, Tan\u00a0Jia Ye, Goh\u00a0Geok Ling, and Vivek Balachandran. 2024. QIris: Quantum Implementation of Rainbow Table Attacks. In International Conference on Information Systems Security. Springer, 213\u2013222."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Andrew Cross Ali Javadi-Abhari Thomas Alexander Niel De\u00a0Beaudrap Lev\u00a0S Bishop Steven Heidel Colm\u00a0A Ryan Prasahnt Sivarajah John Smolin Jay\u00a0M Gambetta et\u00a0al. 2022. OpenQASM 3: A broader and deeper quantum assembly language. ACM Transactions on Quantum Computing 3 3 (2022) 1\u201350. https:\/\/doi.org\/10.1145\/3505636.","DOI":"10.1145\/3505636"},{"key":"e_1_3_3_1_16_2","unstructured":"2024. ObfusQate Github Repository. https:\/\/github.com\/vivekianity\/obfusqate. Accessed: 2025-03-02."}],"event":{"name":"CheckMATE '25: Proceedings of the 2025 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks","location":"Taipei Taiwan","acronym":"CheckMATE '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733817.3762700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T16:47:30Z","timestamp":1766594850000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733817.3762700"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":15,"alternative-id":["10.1145\/3733817.3762700","10.1145\/3733817"],"URL":"https:\/\/doi.org\/10.1145\/3733817.3762700","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"2025-12-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}