2011
DOI: 10.1007/978-3-642-20465-4_26
|View full text |Cite
|
Sign up to set email alerts
|

Concurrent Composition in the Bounded Quantum Storage Model

Abstract: Abstract. We define the BQS-UC model, a variant of the UC model, that deals with protocols in the bounded quantum storage model. We present a statistically secure commitment protocol in the BQS-UC model that composes concurrently with other protocols and an (a-priori) polynomially-bounded number of instances of itself. Our protocol has an efficient simulator which is important if one wishes to compose our protocol with protocols that are only computationally secure. Combining our result with prior results, we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(24 citation statements)
references
References 13 publications
0
24
0
Order By: Relevance
“…For example, along with their impossiblity result, Canetti and Fischlin also show that a  resource can be constructed if we assume a common reference string (CRS) shared between the players and computationally bounded players [16]. In the quantum case, Unruh showed in [20] that if the adversary has bounded quantum memory, bit commitment that is composable in certain restricted settings is possible 7 . In [21] Unruh also shows that everlasting quantum bit commitment is achievable, if we assume signature cards as trusted setup.…”
Section: Previous Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, along with their impossiblity result, Canetti and Fischlin also show that a  resource can be constructed if we assume a common reference string (CRS) shared between the players and computationally bounded players [16]. In the quantum case, Unruh showed in [20] that if the adversary has bounded quantum memory, bit commitment that is composable in certain restricted settings is possible 7 . In [21] Unruh also shows that everlasting quantum bit commitment is achievable, if we assume signature cards as trusted setup.…”
Section: Previous Resultsmentioning
confidence: 99%
“…Our framework can also be applied to situations where agents exchange a superposition of different numbers of messages in a superposition of orders in time, and provides an operational formalism for studying indefinite causal structures. We note that the model of computation used in the UC framework [20] does not support Minkowski space-time, so UC cannot be used to analyze relativistic protocols.…”
Section: Overview and Scope Of Our Resultsmentioning
confidence: 99%
“…This question was answered in the positive in a number of works, including: Fehr and Schaffner [111], Wehner and Wullschleger [230] (for sequential composition) and Unruh [217] (for bounded concurrent composition).…”
Section: Beyond Limited Quantum Storagementioning
confidence: 99%
“…9,10,37 More recently, Dupuis et al 38,39 constructed two-party quantum protocols for evaluating arbitrary unitary operations, which they proved secure under reasonable computational assumptions in a simulation-based de¯nition similar to what we propose in this work. There was also a line of work on the bounded quantum storage model 11,[40][41][42] developed tools for reasoning about speci¯c types of composition of two-party protocols, under assumptions on the size of the adversary's quantum storage. Many tools have been developed in recent years on modeling and analyzing composable security for protocols of device-independent quantum key-exchange and randomness expansion.…”
Section: Analyses Of Quantum Protocolsmentioning
confidence: 99%