Composable Security of Delegated Quantum Computation.
Vedran DunjkoJoseph F. FitzsimonsChristopher PortmannRenato RennerPublished in: ASIACRYPT (2) (2014)
Keyphrases
- quantum computation
- access control
- information security
- network security
- security issues
- security requirements
- distributed environment
- security policies
- statistical databases
- security threats
- security mechanisms
- security vulnerabilities
- security problems
- key management
- smart grid
- computer security
- security analysis
- cyber security
- security properties
- neural network
- functional requirements
- high security
- intelligent agents
- information assurance
- low cost