Login / Signup

Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices.

Carl A. MillerYaoyun Shi
Published in: J. ACM (2016)
Keyphrases
  • third party
  • computationally efficient
  • neural network
  • information retrieval
  • low cost
  • quantum computing