2018
DOI: 10.1007/978-3-319-78372-7_16
|View full text |Cite
|
Sign up to set email alerts
|

Unforgeable Quantum Encryption

Abstract: We study the problem of encrypting and authenticating quantum data in the presence of adversaries making adaptive chosen plaintext and chosen ciphertext queries. Classically, security games use string copying and comparison to detect adversarial cheating in such scenarios. Quantumly, this approach would violate no-cloning. We develop new techniques to overcome this problem: we use entanglement to detect cheating, and rely on recent results for characterizing quantum encryption schemes. We give definitions for … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
65
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 28 publications
(65 citation statements)
references
References 26 publications
0
65
0
Order By: Relevance
“…Q q Q security models a fully quantum adversary with quantum access to all oracles in the first stage. 1 It is notation-wise convenient to define an order for the notions, with Q ≥ C and q ≥ c, consequently implying a partial order…”
Section: Ind-cca Security Against Partially or Fully Quantum Adversariesmentioning
confidence: 99%
“…Q q Q security models a fully quantum adversary with quantum access to all oracles in the first stage. 1 It is notation-wise convenient to define an order for the notions, with Q ≥ C and q ≥ c, consequently implying a partial order…”
Section: Ind-cca Security Against Partially or Fully Quantum Adversariesmentioning
confidence: 99%
“…It is interesting to note that similar problems arise in encryption schemes of quantum data and a convincing solution was recently found [2,3]. However, it relies on the fact that for quantum messages, authentication implies secrecy.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, the single query is allowed in a limited query model with an non-standard restriction. 3 Zhandry recently showed a separation between PO and GYZ by means of the powerful tool of obfuscation [31].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Such function was used well in quantum money protocols. Moreover, Alagic et al proposed a problem about signing a quantum state, which reflects the demand of a one‐way function with quantum states as input. It is feasible to conceive a one‐way function of “quantum‐quantum” mode, or to say, a full quantum one‐way function, under the assumption of general quantum computers.…”
Section: Introductionmentioning
confidence: 99%