Hidden cosets and applications to unclonable cryptography
DOI10.1007/978-3-030-84242-0_20zbMath1489.81019arXiv2107.05692OpenAlexW3193498469MaRDI QIDQ2120094
Jiahui Liu, Mark Zhandry, Andrea Coladangelo, Qipeng Liu
Publication date: 31 March 2022
Full work available at URL: https://arxiv.org/abs/2107.05692
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum state estimation, approximate cloning (81P50) Quantum algorithms and complexity in the theory of computing (68Q12) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94) Alternative quantum mechanics (including hidden variables, etc.) (81Q65) Entanglement measures, concurrencies, separability criteria (81P42) Quantum state tomography, quantum state discrimination (81P18)
Related Items (12)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Return of GGH15: provable security against zeroizing attacks
- On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
- On perfect correctness in (lockable) obfuscation
- Secure software leasing
- Candidate obfuscation via oblivious LWE sampling
- Quantum lightning never strikes the same state twice
- The magic of ELFs
- Quantum money from knots
- Constrained Pseudorandom Functions and Their Applications
- Limitations of Quantum Advice and One-Way Communication
- Quantum money from hidden subspaces
- A monogamy-of-entanglement game with applications to device-independent quantum cryptography
- How to use indistinguishability obfuscation
This page was built for publication: Hidden cosets and applications to unclonable cryptography