[1] |
SHOR P W. Algorithms for Quantum Computation: Discrete Logarithms and Factoring[C]// IEEE. The Symposium on Foundations of Computer Science, IEEE Computer Society. New York: IEEE, 1994: 124-134.
|
[2] |
WIESNER S. Conjugate Coding[J]. ACM Sigact News, 1983, 15(1): 78-88.
|
[3] |
BENNETT C H, BRASSARD G, BREIDBART S, et al. Quantum Cryptography, or Unforgeable Subway Tokens[C]// Springer. Advances in Cryptology. Heidelberg: Springer, 1983: 267-275.
|
[4] |
AARONSON S. Quantum Copy-Protection and Quantum Money[C]// IEEE. 2009 Computational Complexity. New York: IEEE, 2009: 229-242.
|
[5] |
LUTOMIRSKI A, AARONSON S, FARHI E, et al. Breaking and Making Quantum Money: toward a New Quantum Cryptographic Protocol[EB/OL]. (2009-12-21) [2021-12-15]. https://doi.org/10.48550/arXiv.0912.3825.
|
[6] |
AARONSON S, CHRISTIANO P. Quantum Money from Hidden Subspaces[C]// ACM. Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing. New York: ACM, 2012: 41-60.
|
[7] |
LUTOMIRSKI A. An Online Attack against Wiesner's Quantum Money[EB/OL]. (2010-10-1) [2021-12-15]. https://doi.org/10.48550/arXiv.1010.0256.
|
[8] |
MOLINA A, VIDICK T, WATROUS J. Optimal Counterfeiting Attacks and Generalizations for Wiesner’s Quantum Money[C]// Springer. Conference on Quantum Computation, Communication, and Cryptography. Heidelberg: Springer, 2012: 45-64.
|
[9] |
BRODUTCH A, NAGAJ D, SATTATH O, et al. An Adaptive Attack on Wiesner's Quantum Money[EB/OL]. (2014-4-5) [2021-12-15]https://doi.org/10.48550/arXiv.1404.1507.
|
[10] |
HU Zhiquan, XUE Lide, YANG Wei. Attack on Hidden Subspace Quantum Money[J]. Information Technology and Network Security, 2021, 40(8): 17-23, 29.
|
|
胡志泉, 薛立德, 杨威. 基于隐藏子空间的量子货币的攻击研究[J]. 信息技术与网络安全, 2021, 40(8):17-23,29.
|
[11] |
PASTAWSKI F, YAO N Y, JIANG Liang, et al. Unforgeable Noise-Tolerant Quantum Tokens[J]. Proceedings of the National Academy of Sciences, 2012, 109(40): 16079-16082.
doi: 10.1073/pnas.1203552109
URL
|
[12] |
KUMAR N. Practically Feasible Robust Quantum Money with Cassical Verification[EB/OL]. (2019-11-20) [2021-12-15]. https://doi.org/10.3390/cryptography3040026.
|
[13] |
SHMUELI O. Public-Key Quantum Money with a Classical Bank[EB/OL]. (2021-10-24) [2021-12-15]. https://ia.cr/2021/1427.
|
[14] |
RADIAN R, SATTATH O. Semi-Quantum Money[J]. Journal of Cryptology, 2022, 35(2): 1-70.
doi: 10.1007/s00145-021-09406-y
URL
|
[15] |
GUAN Jianyu, ARRAZOLA J M, AMIRI R, et al. Experimental Preparation and Verification of Quantum Money[EB/OL]. (2018-03-27) [2021-12-15]. https://doi.org/10.1103/PhysRevA.97.032338.
|
[16] |
BOZZIO M, ORIEUX A, TRIGO V, et al. Experimental Investigation of Practical Unforgeable Quantum Money[EB/OL]. (2018-01-30) [2021-12-15]. https://doi.org/10.1038/s41534-018-0058-2.
|
[17] |
MOSCA M, STEBILA D. Quantum Coins[J]. Error-Correcting Codes, Finite Geometries and Cryptography, 2010, 5(23): 35-47.
|
[18] |
AL-DAOUD E. Unconditionally Secure Quantum Payment System[C]// WAS. World Academy of Science, Engineering and Technology International Journal of Nuclear and Quantum Engineering. New York: WAS, 2007: 64-67.
|
[19] |
MOULICK S R, PANIGRAHI P K. Quantum Cheques[J]. Quantum Information Processing, 2016, 15(6): 2475-2486.
doi: 10.1007/s11128-016-1273-4
URL
|
[20] |
NGOC D D, VAN M N. Quantum E-Cheques[EB/OL]. (2017-05-29) [2021-12-15]. https://doi.org/10.48550/arXiv.1705.10083.
|
[21] |
JOGENFORS J. Quantum Bitcoin: An Anonymous and Distributed Currency Secured by the No-Cloning Theorem of Quantum Mechanics[EB/OL].(2016-04-05) [2021-12-18]. https://doi.org/10.48550/arXiv.1604.01383.
|
[22] |
BEHERA B K, BANERJEE A, PANIGRAHI P K. Experimental Realization of Quantum Cheque Using a Five-Qubit Quantum Computer[EB/OL]. (2017-11-12) [2021-12-15]. https://doi.org/10.1007/s11128-017-1762-0.
|
[23] |
BUHRMAN H, CLEVE R, WATROUS J, et al. Quantum Fingerprinting[EB/OL]. (2001-09-26) [2021-12-15]. https://doi.org/10.1103/PhysRevLett.87.167902.
|
[24] |
ABLAYEV F, VASILIEV A. Quantum Hashing[EB/OL]. (2013-10-18) [2021-10-16]. https://doi.org/10.48550/arXiv.1310.4922
|
[25] |
BEHERA A, PAUL G. Quantum to Classical One-Way Function and Its Applications in Quantum Money Authentication[EB/OL]. (2018-06-30) [2021-11-05]. https://doi.org/10.1007/s11128-018-1965-z.
|
[26] |
QIN Sujuan, GAO Fei, WEN Qiaoyan, et al. Improving the Security of Multiparty Quantum Secret Sharing Against an Attack with a Fake Signal[J]. Physics Letters A, 2006, 357(2): 101-103.
doi: 10.1016/j.physleta.2006.04.030
URL
|
[27] |
GAO Fei, QIN Sujuan, GUO Fenzhuo, et al. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols[J]. IEEE Journal of Quantum Electronics, 2011, 47(5): 630-635.
doi: 10.1109/JQE.2011.2107889
URL
|
[28] |
SCHAUER S, SUDA M. A Novel Attack Strategy on Entanglement Swapping QKD Protocols[J]. International Journal of Quantum Information, 2008, 6(4): 841-858.
doi: 10.1142/S0219749908003736
URL
|
[29] |
LIN Song, GAO Fei, GUO Fenzhuo, et al. Comment on “Multiparty Quantum Secret Sharing of Classical Messages Based on Entanglement Swapping”[EB/OL]. (2007-09-26) [2021-12-15]. https://doi.org/10.1103/PhysRevA.76.036301.
|
[30] |
HE Guangping. Comment on “Experimental Single Qubit Quantum Secret Sharing”[EB/OL]. (2007-01-11) [2021-12-15]. https://doi.org/10.1103/PhysRevLett.98.028901.
|