2012 IEEE 53rd Annual Symposium on Foundations of Computer Science 2012
DOI: 10.1109/focs.2012.37
|View full text |Cite
|
Sign up to set email alerts
|

How to Construct Quantum Random Functions

Abstract: In the presence of a quantum adversary, there are two possible definitions of security for a pseudorandom function. The first, which we call standard-security, allows the adversary to be quantum, but requires queries to the function to be classical. The second, quantum-security, allows the adversary to query the function on a quantum superposition of inputs, thereby giving the adversary a superposition of the values of the function at many inputs at once. Existing techniques for proving the security of pseudor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
164
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 185 publications
(165 citation statements)
references
References 16 publications
1
164
0
Order By: Relevance
“…The next definition and lemma are given by Zhandry [Zha12b] and allow for the efficient simulation of an exponentially-large list of samples, given only a polynomial number of samples: Definition 2.3 (Small-range distributions [Zha12b] A special case of this theorem is when F is a constant function and each of the distirbutions D x are the uniform distribution. In this case, Lemma 2.6 reduces to the following result of Boneh and Zhandry [BZ13]: any quantum algorithm making q queries to a random oracle H from X to Y can output q + 1 input/output pairs of H with probability at most (q + 1)/|Y|.…”
Section: Toolsmentioning
confidence: 99%
See 1 more Smart Citation
“…The next definition and lemma are given by Zhandry [Zha12b] and allow for the efficient simulation of an exponentially-large list of samples, given only a polynomial number of samples: Definition 2.3 (Small-range distributions [Zha12b] A special case of this theorem is when F is a constant function and each of the distirbutions D x are the uniform distribution. In this case, Lemma 2.6 reduces to the following result of Boneh and Zhandry [BZ13]: any quantum algorithm making q queries to a random oracle H from X to Y can output q + 1 input/output pairs of H with probability at most (q + 1)/|Y|.…”
Section: Toolsmentioning
confidence: 99%
“…Along these lines, Zhandry [Zha12b] showed how to construct pseudorandom functions (PRFs) that remain secure even when the adversary is allowed to issue quantum queries to the PRF. A quantum query is a superposition of inputs x ψ x |x of the attacker's choice.…”
Section: Introductionmentioning
confidence: 99%
“…For completeness, we give a clean proof using a tool developed by Zhandry [32]. We describe below a simplified version of the tool, taken from [31]. …”
Section: Toolboxmentioning
confidence: 99%
“…Zhandry [240] showed how to plant challenges in the QRO model at the beginning of the execution, and Unruh [222] showed how to reprogram the RO during runtime. Security definitions allowing superposition access have subsequently been studied by Boneh and Zhandry [37,240] in the context of encryption, digital signatures and the construction of pseudo-random functions. See also related work by Damgård, Funder, Nielsen and Salvail [92], who study superposition attacks on secret-sharing and multi-party protocols.…”
Section: Superposition Access To Oracles: Quantum Security Notionsmentioning
confidence: 99%
“…Related to the topic of quantum security notions (Sect. 4.4), Zhandry [240] has shown how to construct quantum-security pseudo-random functions (qPRF). Classically, it is well-known that using the PRF in a three-round Feistel network yields a pseudo-random permutation.…”
Section: Conclusion and Open Problemsmentioning
confidence: 99%