Position-Based Quantum Cryptography: Impossibility and Constructions, SIAM Journal on Computing, vol.43, issue.1, pp.150-178, 2014. ,
DOI : 10.1137/130913687
Multi-prover interactive proofs: how to remove intractability, Proceedings of the twentieth annual ACM symposium on Theory of computing , STOC '88, pp.113-131, 1988. ,
DOI : 10.1145/62212.62223
Arbitrarily Long Relativistic Bit Commitment, Physical Review Letters, vol.115, issue.25, p.250501, 2015. ,
DOI : 10.1103/PhysRevLett.115.250501
URL : https://hal.archives-ouvertes.fr/hal-01246243
Position based cryptography, Advances in Cryptology-CRYPTO 2009, pp.391-407, 2009. ,
DOI : 10.1007/978-3-642-03356-8_23
Two Provers in Isolation, Advances in Cryptology?ASIACRYPT 2011, pp.407-430, 2011. ,
DOI : 10.1007/978-3-642-25385-0_22
On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments, Advances in Cryptology -EUROCRYPT 2016 -35th Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, Part II, pp.477-496, 2016. ,
DOI : 10.1007/978-3-662-49896-5_17
A survey on private information retrieval, Bulletin of the EATCS. Citeseer, 2004. ,
Protecting data privacy in private information retrieval schemes, Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, pp.151-160, 1998. ,
DOI : 10.1145/276698.276723
URL : http://doi.org/10.1006/jcss.1999.1689
Quantum symmetrically-private information retrieval, Information Processing Letters, vol.90, issue.3, pp.109-114, 2004. ,
DOI : 10.1016/j.ipl.2004.02.003
Unconditionally Secure Bit Commitment, Physical Review Letters, vol.83, issue.7, pp.1447-1450, 1999. ,
DOI : 10.1103/PhysRevLett.83.1447
Secure Classical Bit Commitment Using Fixed Capacity Communication Channels, Journal of Cryptology, vol.18, issue.4, pp.313-335, 2005. ,
DOI : 10.1007/s00145-005-0905-8
URL : http://arxiv.org/abs/quant-ph/9906103
Unconditionally secure bit commitment with flying qudits, New Journal of Physics, vol.13, issue.11, p.113015, 2011. ,
DOI : 10.1088/1367-2630/13/11/113015
URL : http://doi.org/10.1088/1367-2630/13/11/113015
Unconditionally Secure Bit Commitment by Transmitting Measurement Outcomes, Physical Review Letters, vol.109, issue.13, p.130501, 2012. ,
DOI : 10.1103/PhysRevLett.109.130501
URL : http://arxiv.org/abs/1108.2879
Quantum tagging: Authenticating location via quantum information and relativistic signaling constraints, Physical Review A, vol.84, issue.1, p.12326, 2011. ,
DOI : 10.1103/PhysRevA.84.012326
Secure bit commitment from relativistic constraints. Information Theory, IEEE Transactions on, vol.59, issue.7, pp.4687-4699, 2013. ,
DOI : 10.1109/tit.2013.2247463
URL : http://arxiv.org/abs/1206.1740
Is Quantum Bit Commitment Really Possible?, Physical Review Letters, vol.78, issue.17, pp.3410-3413, 1997. ,
DOI : 10.1103/PhysRevLett.78.3410
URL : http://arxiv.org/abs/quant-ph/9603004
Experimental bit commitment based on quantum communication and special relativity, Phys. Rev. Lett, vol.111, p.180504, 2013. ,
Practical relativistic bit commitment, Phys. Rev. Lett, vol.115, p.30502, 2015. ,
Insecurity of position-based quantum-cryptography protocols against entanglement attacks, Physical Review A, vol.83, issue.1, p.12322, 2011. ,
Unconditionally Secure Quantum Bit Commitment is Impossible, Physical Review Letters, vol.78, issue.17, pp.3414-3417, 1997. ,
DOI : 10.1103/PhysRevLett.78.3414
Distributed Oblivious Transfer, Proc. ASIACRYPT 2000, pp.205-219, 2000. ,
DOI : 10.1007/3-540-44448-3_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.2066
Classical and quantum strategies for bit commitment schemes in the two-prover model, 2007. ,
Quantum Position Verification in the Random Oracle Model, Advances in Cryptology?CRYPTO 2014, pp.1-18, 2014. ,
DOI : 10.1007/978-3-662-44381-1_1
Raphaël Houlmann, Gianluca Boso, Félix Bussières , and Hugo Zbinden. 24-hour relativistic bit commitment, 2016. ,