{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:38:02Z","timestamp":1766158682563},"reference-count":0,"publisher":"Rinton Press","issue":"11&12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["QIC"],"published-print":{"date-parts":[[2016,9]]},"abstract":"<jats:p>Unlike classical money, which is hard to forge for practical reasons (e.g. producing paper with a certain property), quantum money is attractive because its security might be based on the no-cloning theorem. The first quantum money scheme was introduced by Wiesner circa 1970. Although more sophisticated quantum money schemes were proposed, Wiesner\u2019s scheme remained appealing because it is both conceptually clean as well as relatively easy to implement. We show efficient adaptive attacks on Wiesner\u2019s quantum money scheme [1] (and its variant by Bennett et al. [2]), when valid money is accepted and passed on, while invalid money is destroyed. We propose two attacks, the first is inspired by the Elitzur-Vaidman bomb testing problem [3, 4], while the second is based on the idea of protective measurements [5]. It allows us to break Wiesner\u2019s scheme with 4 possible states per qubit, and generalizations which use more than 4 states per qubit. The attack shows that Wiesner\u2019s scheme can only be safe if the bank replaces valid notes after validation.<\/jats:p>","DOI":"10.26421\/qic16.11-12-7","type":"journal-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T02:50:21Z","timestamp":1614221421000},"page":"1048-1070","source":"Crossref","is-referenced-by-count":4,"title":["An adaptive attack on Wiesner's quantum money"],"prefix":"10.26421","volume":"16","author":[{"given":"Daniel","family":"Nagaj","sequence":"first","affiliation":[]},{"given":"Or","family":"Sattath","sequence":"additional","affiliation":[]},{"given":"Aharon","family":"Brodutch","sequence":"additional","affiliation":[]},{"given":"Dominique","family":"Unruh","sequence":"additional","affiliation":[]}],"member":"10955","published-online":{"date-parts":[[2016,9]]},"container-title":["Quantum Information and Computation"],"original-title":[],"deposited":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T02:50:28Z","timestamp":1614221428000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.rintonpress.com\/journals\/doi\/QIC16.11-12-7.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":0,"journal-issue":{"issue":"11&12","published-online":{"date-parts":[[2016,9]]},"published-print":{"date-parts":[[2016,9]]}},"URL":"https:\/\/doi.org\/10.26421\/qic16.11-12-7","relation":{},"ISSN":["1533-7146","1533-7146"],"issn-type":[{"value":"1533-7146","type":"print"},{"value":"1533-7146","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9]]}}}