{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:39:09Z","timestamp":1725773949323},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642544286"},{"type":"electronic","value":"9783642544293"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54429-3_8","type":"book-chapter","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T09:33:06Z","timestamp":1394184786000},"page":"121-142","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Unconditionally-Secure and Reusable Public-Key Authentication"],"prefix":"10.1007","author":[{"given":"Lawrence M.","family":"Ioannou","sequence":"first","affiliation":[]},{"given":"Michele","family":"Mosca","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,8]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press LLC, Boca Raton (1996)"},{"key":"8_CR2","unstructured":"Gottesman, D., Chuang, I.L.: Quantum Digital Signatures (2001). quant-ph\/0105032"},{"key":"8_CR3","unstructured":"Lamport, L.: Constructing digital signatures from a one-way function. CSL 98, SRI International (1979)"},{"key":"8_CR4","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/11426639_16","volume-title":"EUROCRYPT 2005","author":"A Kawachi","year":"2005","unstructured":"Kawachi, A., Koshiba, T., Nishimura, H., Yamakami, T.: Computational indistinguishability between quantum states and its cryptographic application. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 268\u2013284. Springer, Heidelberg (2005). http:\/\/arxiv.org\/abs\/quants-ph\/0403069"},{"key":"8_CR5","first-page":"0345","volume":"8","author":"M Hayashi","year":"2008","unstructured":"Hayashi, M., Kawachi, A., Kobayashi, H.: Quantum measurements for hidden subgroup problems with optimal sample complexity. Quantum Inf. Comput. 8, 0345\u20130358 (2008)","journal-title":"Quantum Inf. Comput."},{"key":"8_CR6","unstructured":"Ioannou, L.M., Mosca, M.: Public-key cryptography based on bounded quantum reference frames. http:\/\/arxiv.org\/abs\/0903.5156"},{"key":"8_CR7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography (Volume I): Basic Tools","author":"O Goldreich","year":"2001","unstructured":"Goldreich, O.: Foundations of Cryptography (Volume I): Basic Tools. Cambridge University Press, Cambridge (2001)"},{"key":"8_CR8","series-title":"LNCS","first-page":"206","volume-title":"CRYPTO 1990","author":"D Chaum","year":"1991","unstructured":"Chaum, D., Roijakkers, S.: Unconditionally secure digital signatures. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 206\u2013214. Springer, Heidelberg (1991)"},{"key":"8_CR9","unstructured":"Gottesman, D.: Quantum public key cryptography with information-theoretic security. Workshop on classical and quantum information security, Caltech, 15\u201318 December 2005. http:\/\/www.cpi.caltech.edu\/quantum-security\/program.html; see also http:\/\/www.perimeterinstitute.ca\/personal\/dgottesman"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-540-74143-5_19","volume":"4622","author":"I Damgaard","year":"2007","unstructured":"Damgaard, I., Fehr, S., Salvail, L., Schaffner, C.: Secure identification and QKD in the bounded-quantum-storage model. CRYPTO 2007 4622, 342\u2013359 (2007)","journal-title":"CRYPTO 2007"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1088\/1367-2630\/8\/4\/058","volume":"8","author":"SD Bartlett","year":"2006","unstructured":"Bartlett, S.D., Rudolph, T., Spekkens, R.W., Turner, P.S.: Degradation of a quantum reference frame. New J. Phys. 8, 58 (2006)","journal-title":"New J. Phys."},{"key":"8_CR12","unstructured":"Gutoski, G.: Quantum strategies and local operations. Ph.D. thesis, University of Waterloo (2009)"},{"key":"8_CR13","series-title":"LNCS","first-page":"435","volume-title":"FCT 2007","author":"R Mittal","year":"2007","unstructured":"Mittal, R., Szegedy, M.: Product rules in semidefinite programming. In: Csuhaj-Varj\u00fa, E., \u00c9sik, Z. (eds.) FCT 2007. LNCS, vol. 4639, pp. 435\u2013445. Springer, Heidelberg (2007)"},{"issue":"9","key":"8_CR14","doi-asserted-by":"publisher","first-page":"090501","DOI":"10.1103\/PhysRevLett.98.090501","volume":"98","author":"W van Dam","year":"2007","unstructured":"van Dam, W., Mauro D\u2019Ariano, G., Ekert, A., Macchiavello, C., Mosca, M.: Optimal quantum circuits for general phase estimation. Phys. Rev. Lett. 98(9), 090501 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"8_CR15","unstructured":"Beals, R., Buhrman, H., Cleve, R., Mosca, M., de Wolf, R.: Quantum lower bounds by polynomials. In FOCS \u201998: Proceedings of the 39th Annual Symposium on Foundations of Computer Science (1998)"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"7971","DOI":"10.1088\/1751-8113\/40\/28\/S07","volume":"40","author":"W van Dam","year":"2007","unstructured":"van Dam, W., Mauro D\u2019Ariano, G., Ekert, A., Macchiavello, C., Mosca, M.: Optimal phase estimation in quantum networks. J. Phys. A: Math. Theor. 40, 7971\u20137984 (2007)","journal-title":"J. Phys. A: Math. Theor."},{"issue":"4","key":"8_CR17","doi-asserted-by":"publisher","first-page":"042338","DOI":"10.1103\/PhysRevA.72.042338","volume":"72","author":"G Chiribella","year":"2005","unstructured":"Chiribella, G., D\u2019Ariano, G.M., Sacchi, M.F.: Optimal estimation of group transformations using entanglement. Phys. Rev. A 72(4), 042338 (2005)","journal-title":"Phys. Rev. A"},{"key":"8_CR18","unstructured":"Watrous, J.: Theory of quantum information. Lecture notes for course CS 789, University of Waterloo, http:\/\/www.cs.uwaterloo.ca\/~watrous\/ (2008)"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Cleve, R., Slofstra, W., Unger, F., Upadhyay, S.: Strong parallel repetition theorem for quantum XOR proof systems (2006). arXiv:quant-ph\/0608146v1","DOI":"10.1109\/CCC.2007.24"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Kitaev, A., Watrous, J.: Parallelization, amplification, and exponential time simulation of quantum interactive proof systems. In STOC \u201900: Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing (2000)","DOI":"10.1145\/335305.335387"}],"container-title":["Lecture Notes in Computer Science","Theory of Quantum Computation, Communication, and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54429-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T21:29:17Z","timestamp":1676582957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54429-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642544286","9783642544293"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54429-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}