2021
DOI: 10.1007/978-3-030-77886-6_19
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Quantum Lightning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…This scheme's underlying hard problem is that of the multi-collision resistance of its polynomial hash functions of degree 2 over F 2 . The [17] scheme has been cryptanalysed 6 , by Bhaskar in [13], which found a vulnerability in the security of the generation scheme that would allow for the bypassing of multi-collision resistance, when the parameters of the scheme fit a certain condition. Due to the nature of this vulnerability, it may simply be avoided by adjusting the parameters used in the scheme or adjusting the relevant hardness assumptions.…”
Section: A Brief History Of Quantum Money Schemesmentioning
confidence: 99%
“…This scheme's underlying hard problem is that of the multi-collision resistance of its polynomial hash functions of degree 2 over F 2 . The [17] scheme has been cryptanalysed 6 , by Bhaskar in [13], which found a vulnerability in the security of the generation scheme that would allow for the bypassing of multi-collision resistance, when the parameters of the scheme fit a certain condition. Due to the nature of this vulnerability, it may simply be avoided by adjusting the parameters used in the scheme or adjusting the relevant hardness assumptions.…”
Section: A Brief History Of Quantum Money Schemesmentioning
confidence: 99%
“…Their attack is entirely classical and uses only the serial number given in the banknote. Roberts [23] proposed an attack on the assumption underlying the scheme of [30] for a certain parameter regime. However, as discussed in a later version of [30], the attack does not make the system insecure.…”
Section: Previous Cryptanalysismentioning
confidence: 99%
“…Finally, we show that a variant of quantum lightning cannot have its security black-box reduced to cryptographic games. This maybe an indication of why we are still looking to find a satisfactory assumption under which vanilla quantum lightning is possible [40].…”
Section: Conclusion and Open Problemsmentioning
confidence: 99%