Classical Cryptographic Protocols in a Quantum World
@inproceedings{Hallgren2011ClassicalCP, title={Classical Cryptographic Protocols in a Quantum World}, author={Sean Hallgren and Adam D. Smith and Fang Song}, booktitle={IACR Cryptol. ePrint Arch.}, year={2011} }
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If we accept that quantum information processing is the most realistic model of physically feasible computation, then we must ask: what classical protocols remain secure against quantum attackers?
Our main contribution is showing the existence…
38 Citations
On Classical Cryptographic Protocols in Post-Quantum World
- Computer Science, Mathematics
- 2017
The proposed technique (full factorization) aims at reducing the original protocol into a statisticallysecure protocol by turning it into a hybrid one where all cryptographic primitives are substituted by appropriate ideal functionalities.
Quantum cryptography beyond quantum key distribution
- Computer Science, MathematicsDes. Codes Cryptogr.
- 2016
This review article, aimed primarily at cryptographers unfamiliar with the quantum world, survey the area of theoretical quantum cryptography, with an emphasis on the constructions and limitations beyond the realm of QKD.
Quantum security analysis of a lattice-based oblivious transfer protocol
- Computer Science, MathematicsFrontiers of Information Technology & Electronic Engineering
- 2017
This paper proves the security of the lattice-based OT protocol proposed by Peikert et al. (CRYPTO, 2008), which is universally composably secure under the assumption of learning with errors hardness, in the quantum setting, using three general quantum security analysis frameworks.
A Note on Quantum Security for Post-Quantum Cryptography
- Computer Science, MathematicsPQCrypto
- 2014
Shor’s quantum factoring algorithm and a few other efficient quantum algorithms break many classical crypto-systems. In response, people proposed post-quantum cryptography based on computational…
Quantum Security of Cryptographic Primitives
- Computer Science, MathematicsArXiv
- 2017
This work proposes the first systematic classification of quantum security scenarios, and provides a novel framework for the quantum security (both in terms of indistinguishability and semantic security) of secret-key encryption schemes, and gives explicit secure constructions, as well as impossibility results.
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
- Computer Science, MathematicsCRYPTO
- 2013
The study of quantum-secure digital signatures and quantum chosen ciphertext security is initiated by allowing the adversary to issue quantum chosen message queries: given a superposition of messages, the adversary receives asuperposition of signatures on those messages.
Feasibility and Completeness of Cryptographic Tasks in the Quantum World
- Computer Science, MathematicsTCC
- 2013
This work studies the feasibility of realizing functionalities in the framework of universal composability, with respect to both computational and information-theoretic security, and shows that existing feasibility results carry over unchanged from the classical to the quantum world.
A Comprehensive Analysis of Quantum E-voting Protocols
- Computer ScienceArXiv
- 2018
This paper systematize and evaluate the security of suggested e-voting protocols based on quantum technology, and examines the claims of these works concerning privacy, correctness and verifiability, and if they are correctly attributed to the proposed protocols.
Composable security in relativistic quantum cryptography
- Computer Science, MathematicsNew Journal of Physics
- 2019
It is shown that coin flipping can be constructed from the primitive channel with delay, biased coin flipping, bit commitment and channel with Delay are all impossible without further assumptions, and it is impossible to improve a channel withdelay.
General Properties of Quantum Bit Commitments
- Computer Science, Physics
- 2021
This work explores general properties of conditional quantum bit commitments that additionally rely on quantum computational hardness but without any mathematical structures, e.g. quantum-secure one-way functions and discovers that any interactive quantum bit commitment scheme can be compiled into a non-interactive one.
References
SHOWING 1-10 OF 99 REFERENCES
Improving the Security of Quantum Protocols via Commit-and-Open
- Computer Science, MathematicsCRYPTO
- 2009
A general "compiler" improving the security of two-party quantum protocols is shown: if the original protocol is secure against an "almost honest" adversary, then the compiled protocol isSecure against an arbitrary computationally bounded (quantum) adversary.
Secure multi-party quantum computation
- Computer Science, MathematicsSTOC '02
- 2002
This work uses a new tool to show how to perform any multi-party quantum computation as long as the number of dishonest players is less than n/6 and gives a protocol which tolerates any t ξ n/4 cheating parties (out of n).
Unconditionally secure quantum bit commitment is impossible
- Computer Science, Mathematics
- 1997
It is shown that the claim that quantum cryptography can provide protocols that are unconditionally secure, that is, for which the security does not depend on any restriction on the time, space, or technology available to the cheaters, does not hold for any quantum bit commitment protocol.
Fully device-independent quantum key distribution.
- Computer Science
- 2014
This work rigorously proves the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks, and achieves a linear key rate and tolerates a constant noise rate in the devices.
Feasibility and Completeness of Cryptographic Tasks in the Quantum World
- Computer Science, MathematicsTCC
- 2013
This work studies the feasibility of realizing functionalities in the framework of universal composability, with respect to both computational and information-theoretic security, and shows that existing feasibility results carry over unchanged from the classical to the quantum world.
Quantum-Secure Coin-Flipping and Applications
- Computer Science, MathematicsASIACRYPT
- 2009
This paper proves classical coin-flipping secure in the presence of quantum adversaries, and discusses how the protocol can be applied to a recently proposed method for improving the security of quantum protocols, resulting in an implementation without set-up assumptions.
Computational Collapse of Quantum State with Application to Oblivious Transfer
- Computer Science, MathematicsTCC
- 2004
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1-2 quantum oblivious…
Unconditional security in quantum cryptography
- Computer ScienceJACM
- 2001
Basic techniques to prove the unconditional security of quantum crypto graphy are described and a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission is considered.
Concurrent Composition in the Bounded Quantum Storage Model
- Computer Science, MathematicsEUROCRYPT
- 2011
A statistically secure commitment protocol in the BQS-UC model that composes concurrently with other protocols and an (a-priori) polynomially-bounded number of instances of itself is presented.