2020
DOI: 10.1007/978-3-030-64381-2_5
|View full text |Cite
|
Sign up to set email alerts
|

Secure Quantum Extraction Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
6
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 38 publications
1
6
0
Order By: Relevance
“…We build the first constant-round zero-knowledge argument against parallel quantum verifiers from quantum polynomial hardness of an LWE-based circular security assumption. This improves upon the work of [BS20,AP19] who provided such an argument against a single quantum verifier.…”
Section: Technical Overviewsupporting
confidence: 51%
See 2 more Smart Citations
“…We build the first constant-round zero-knowledge argument against parallel quantum verifiers from quantum polynomial hardness of an LWE-based circular security assumption. This improves upon the work of [BS20,AP19] who provided such an argument against a single quantum verifier.…”
Section: Technical Overviewsupporting
confidence: 51%
“…We now describe a naive extension of the [BS20, AP19] approach to the parallel setting (where a receiver interacts with multiple committers), and highlight its pitfalls. We do not assume familiarity with [BS20,AP19]. To commit to messages (m 1 , .…”
Section: A Strawman Solutionmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, to plug into the quantum OT protocol, we need a strong version of extractable commitments from which the committed values can be extracted efficiently without destroying or even disturbing the quantum states of the malicious committer, 2 a property that is at odds with quantum unclonability and rules out several extraction techniques used for achieving arguments of knowledge such as in [Unr12]. In particular, we are not aware of a construction of such extractable commitments without resorting to strong assumptions such as LWE [BS20,AP19], which takes us out of minicrypt. Another standard way to construct extractable commitments is using public-key encryption in the CRS model, which unfortunately again takes us out of minicrypt.…”
Section: Do Ot and Mpc Exist In Miniqcrypt?mentioning
confidence: 99%
“…Post-Quantum Zero-Knowledge with Classical Computational Soundness. Ananth and La Placa [AP20] gave a construction of post-quantum ZK argument for NP with classical com-putational soundness assuming the QLWE assumption. Though such a protocol would be easy to obtain if we assume average-case classical hardness of certain problems in BQP (e.g., factoring) in addition to the QLWE assumption, what is interesting in [AP20] is that they only assume the QLWE assumption.…”
Section: Related Workmentioning
confidence: 99%