2016
DOI: 10.1007/978-3-662-53015-3_3
|View full text |Cite
|
Sign up to set email alerts
|

Semantic Security and Indistinguishability in the Quantum World

Abstract: At CRYPTO 2013, Boneh and Zhandry initiated the study of quantum-secure encryption. They proposed first indistinguishability definitions for the quantum world where the actual indistinguishability only holds for classical messages, and they provide arguments why it might be hard to achieve a stronger notion. In this work, we show that stronger notions are achievable, where the indistinguishability holds for quantum superpositions of messages. We investigate exhaustively the possibilities and subtle differences… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
39
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 52 publications
(40 citation statements)
references
References 22 publications
1
39
0
Order By: Relevance
“…The classical proof of the above (see, e.g., [Gol09]) carries over directly to the quantum case. This was already observed for the case of QCPA by [GHS16], and extends straightforwardly to the case where both the adversary and the simulator gain oracle access to Dec k in the pre-challenge phase. 6 4 Secure Constructions…”
Section: Setupsupporting
confidence: 69%
See 4 more Smart Citations
“…The classical proof of the above (see, e.g., [Gol09]) carries over directly to the quantum case. This was already observed for the case of QCPA by [GHS16], and extends straightforwardly to the case where both the adversary and the simulator gain oracle access to Dec k in the pre-challenge phase. 6 4 Secure Constructions…”
Section: Setupsupporting
confidence: 69%
“…Security model and basic definitions. First, we set down the basic QCCA1 security model, adapting the ideas of [BZ13a; GHS16]. Recall that an encryption scheme is a triple Π = (KeyGen, Enc, Dec) of algorithms (key generation, encryption, and decryption, respectively) satisfying Dec k (Enc k (m)) = m for any key k ← KeyGen and message m. In what follows, all oracles are quantum, meaning that a function f is accessed via the unitary operator |x |y → |x |y ⊕ f (x) .…”
Section: Technical Summary Of Resultsmentioning
confidence: 99%
See 3 more Smart Citations