2019
DOI: 10.1007/978-3-030-36030-6_12
|View full text |Cite
|
Sign up to set email alerts
|

Composable and Finite Computational Security of Quantum Message Transmission

Abstract: Recent research in quantum cryptography has led to the development of schemes that encrypt and authenticate quantum messages with computational security. The security definitions used so far in the literature are asymptotic, gamebased, and not known to be composable. We show how to define finite, composable, computational security for secure quantum message transmission. The new definitions do not involve any games or oracles, they are directly operational: a scheme is secure if it transforms an insecure chann… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(9 citation statements)
references
References 34 publications
0
9
0
Order By: Relevance
“…VIII.F.1 we explain how to define finite computational security. This follows the paradigm of AC (Maurer, 2012;Renner, 2011, 2016), and has been used in e.g., Banfi et al (2019); Coretti et al (2013); and Maurer et al (2012). In Sec.…”
Section: F Secure Quantum Message Transmission With Computational Sec...mentioning
confidence: 99%
See 2 more Smart Citations
“…VIII.F.1 we explain how to define finite computational security. This follows the paradigm of AC (Maurer, 2012;Renner, 2011, 2016), and has been used in e.g., Banfi et al (2019); Coretti et al (2013); and Maurer et al (2012). In Sec.…”
Section: F Secure Quantum Message Transmission With Computational Sec...mentioning
confidence: 99%
“…In Sec. VIII.F.2 we review the results from Banfi et al (2019) on computational security of quantum message transmission (QMT). And in Sec.…”
Section: F Secure Quantum Message Transmission With Computational Sec...mentioning
confidence: 99%
See 1 more Smart Citation
“…The security notions from [3] were recently examined from a composable security point of view [6]. The conclusion of that work was that the "real/ideal" definition of Quantum Authenticated Encryption from [3] does guarantee composable security.…”
Section: Related Workmentioning
confidence: 99%
“…where k = vk, sk. 6 In particular, Equation 26 implies that there exists a Stinespring dilation unitary W Ver vk of Ver vk such that…”
Section: A4 Detailed Proof Of Theorem 511mentioning
confidence: 99%