{"id":"https://openalex.org/W2005170858","doi":"https://doi.org/10.1145/332186.332304","title":"Quantum \u201cencryption\u201d (student paper panel)","display_name":"Quantum \u201cencryption\u201d (student paper panel)","publication_year":2000,"publication_date":"2000-04-01","ids":{"openalex":"https://openalex.org/W2005170858","doi":"https://doi.org/10.1145/332186.332304","mag":"2005170858"},"language":"en","primary_location":{"id":"doi:10.1145/332186.332304","is_oa":true,"landing_page_url":"https://doi.org/10.1145/332186.332304","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/332186.332304","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/332186.332304","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058225581","display_name":"Mark Hurwitz","orcid":null},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mark V. Hurwitz","raw_affiliation_strings":["Space Sciences Laboratory, U.C. Berkeley, and 3L, Boalt Hall","Space Sciences Laboratory, U.C. Berkeley, and 3L, Boalt Hall#TAB#"],"affiliations":[{"raw_affiliation_string":"Space Sciences Laboratory, U.C. Berkeley, and 3L, Boalt Hall","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"Space Sciences Laboratory, U.C. Berkeley, and 3L, Boalt Hall#TAB#","institution_ids":["https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5058225581"],"corresponding_institution_ids":["https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.10235674,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"303","last_page":"313"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.08309999853372574,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.08309999853372574,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.636962890625},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6139885783195496},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47479692101478577},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.4479776620864868},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.40292176604270935},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32438984513282776},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.1303430199623108},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.0973522961139679}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.636962890625},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6139885783195496},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47479692101478577},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.4479776620864868},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.40292176604270935},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32438984513282776},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.1303430199623108},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0973522961139679},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/332186.332304","is_oa":true,"landing_page_url":"https://doi.org/10.1145/332186.332304","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/332186.332304","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/332186.332304","is_oa":true,"landing_page_url":"https://doi.org/10.1145/332186.332304","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/332186.332304","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2005170858.pdf","grobid_xml":"https://content.openalex.org/works/W2005170858.grobid-xml"},"referenced_works_count":3,"referenced_works":["https://openalex.org/W1489958209","https://openalex.org/W1655746780","https://openalex.org/W2191521829"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2359552542","https://openalex.org/W2374897487","https://openalex.org/W4205163163"],"abstract_inverted_index":{"Alice":[0,12,27,44,70,105,121],"wishes":[1],"to":[2,6,54,69,91,129,137],"send":[3],"a":[4,81,116,119],"message":[5,60,97,135],"Bob.":[7,72],"In":[8],"the":[9,24,48,59,84,93,96,102,131,134],"macrophysical":[10],"world,":[11],"and":[13,71,122],"Bob":[14,107],"have":[15],"no":[16],"guarantee":[17],"that":[18,26,111],"Eve":[19,50,112],"(eavesdropper)":[20],"will":[21],"not":[22,114],"intercept":[23],"information":[25,46],"sends.":[28],"Traditional":[29],"methods":[30,88],"for":[31],"exchanging":[32],"information,":[33],"such":[34],"as":[35,98],"written":[36],"correspondence":[37],"or":[38,76],"telephony,":[39],"suffer":[40],"obvious":[41],"vulnerabilities.":[42],"If":[43],"transmits":[45],"via":[47],"Internet,":[49],"has":[51,113],"many":[52],"opportunities":[53],"intercept.":[55],"Numerous":[56],"copies":[57],"of":[58,83,95,133],"are":[61],"stored,":[62],"at":[63],"least":[64],"temporarily,":[65],"on":[66,126],"routers":[67],"intermediate":[68],"During":[73],"transmission,":[74],"\"wiretapping\"":[75],"its":[77],"equivalent":[78],"can":[79,108],"capture":[80],"copy":[82],"message.":[85],"Although":[86],"sophisticated":[87],"may":[89],"attempt":[90],"maintain":[92],"security":[94,124],"it":[99],"moves":[100],"through":[101],"network,":[103],"neither":[104],"nor":[106],"be":[109],"certain":[110],"intercepted":[115],"copy.":[117],"As":[118],"result,":[120],"Bob's":[123],"relies":[125],"their":[127],"ability":[128],"render":[130],"contents":[132],"incomprehensible":[136],"Eve.":[138]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
