2022
DOI: 10.1007/978-3-031-15802-5_9
|View full text |Cite
|
Sign up to set email alerts
|

Certified Everlasting Zero-Knowledge Proof for QMA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…They constructed a one-time SKE scheme with certified deletion without computational assumptions. After that, many works presented various quantum encryption primitives (PKE, ABE, FE and so on) with certified deletion [HMNY21,Por23,BK22,HMNY22]. The root of quantum encryption with certified deletion is revocable quantum time-released encryption by Unruh [Unr15].…”
Section: Other Related Workmentioning
confidence: 99%
“…They constructed a one-time SKE scheme with certified deletion without computational assumptions. After that, many works presented various quantum encryption primitives (PKE, ABE, FE and so on) with certified deletion [HMNY21,Por23,BK22,HMNY22]. The root of quantum encryption with certified deletion is revocable quantum time-released encryption by Unruh [Unr15].…”
Section: Other Related Workmentioning
confidence: 99%
“…Using a hybrid encryption scheme, Hiroka, Morimae, Nishimaki and Yamakawa [HMNY21] extended the scheme in [BI20] to both public-key and attribute-based encryption with privatelyverifiable certified deletion via receiver non-committing encryption [JL00, CFGN96]. Hiroka, Morimae, Nishimaki and Yamakawa [HMNY22b] considered certified everlasting zero-knowledge proofs for QMA via the notion of everlasting security which was first formalized by M üller-Quade and Unruh [MU07]. Bartusek and Khurana [BK22] revisited the notion of certified deletion and presented a unified approach for how to generically convert any public-key, attribute-based, fullyhomomorphic, timed-release or witness encryption scheme into an equivalent quantum encryption scheme with certified deletion.…”
Section: Prior Workmentioning
confidence: 99%
“…This is also the definition we consider in this work. In the same spirit, Hiroka, Morimae, Nishimaki and Yamakawa [HMNY22a] gave a certified everlasting functional encryption scheme which allows the receiver of the ciphertext to obtain the outcome specific function applied the plaintext, but nothing else. In other very recent work, Ananth, Poremba and Vaikuntanathan [APV23] used Gaussian superpositions to construct (key)-revocable cryptosystems, such as public-key encryption, fully homomorphic encryption and pseudorandom functions assuming the hardness of LWE, and Agarwal et al [AKN + 23] introduced a generic compiler for adding key-revocability to a variety of cryptosystems.…”
Section: Prior Workmentioning
confidence: 99%
“…Since Wiesner put forward quantum money in 1983 [Wie83], a novel unclonable primitive that protects digital money against counterfeiting attacks, there have been a myriad of interesting unclonable primitives proposed over the years. They include variants of quantum money [AC12,Zha17,Shm22], quantum one-time programs [BGS13], copy-protection [Aar09, AL20, ALL + 20, CLLZ21], tokenized signatures [BS16, CLLZ21,Shm22], unclonable encryption [Got02,BL20], secure software leasing [AL20, KNY21, BJL + 21], encryption with certified deletion [BI20] and certified zero-knowledge [HMNY22].…”
Section: Introductionmentioning
confidence: 99%