Zero-knowledge against quantum attacks

From MaRDI portal
Publication:2931394

DOI10.1145/1132516.1132560zbMath1301.68131arXivquant-ph/0511020OpenAlexW1971684380WikidataQ21725078 ScholiaQ21725078MaRDI QIDQ2931394

John Watrous

Publication date: 25 November 2014

Published in: SIAM Journal on Computing, Proceedings of the thirty-eighth annual ACM symposium on Theory of Computing (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/quant-ph/0511020




Related Items (75)

A black-box approach to post-quantum zero-knowledge in constant roundsOn the concurrent composition of quantum zero-knowledgeOne-way functions imply secure computation in a quantum worldUnconditionally secure multi-party quantum commitment schemeComplete Problem for Perfect Zero-Knowledge Quantum ProofNew Limits to Classical and Quantum Instance CompressionQuantum computation vs. firewallsOn the time dependence of holographic complexity in a dynamical Einstein-Dilaton modelON THE POWER QUANTUM COMPUTATION OVER REAL HILBERT SPACESSpatial Isolation Implies Zero Knowledge Even in a Quantum WorldNondeterministic unitary OBDDsWatermarking PRFs against quantum adversariesNon-malleable commitments against quantum attacksComplexity of mixed Gaussian states from Fisher information geometrySuccinct arguments in the quantum random oracle modelStatistical zero knowledge and quantum one-way functionsComplexity limitations on one-turn quantum refereed gamesCollapse-Binding Quantum Commitments Without Random OraclesStronger Methods of Making Quantum Interactive Proofs Perfectly CompleteComplexity of mixed states in QFT and holographyCertified everlasting zero-knowledge proof for QMAPost-quantum simulatable extraction with minimal assumptions: black-box and constant-roundA note on the post-quantum security of (ring) signaturesComments on holographic complexityQuantum computationally predicate-binding commitments with application in quantum zero-knowledge arguments for NPNew constructions of collapsing hashesPost-quantum insecurity from LWEUniversally composable \(\varSigma \)-protocols in the global random-oracle modelUniversal reductions: reductions relative to stateful oraclesEfficient authentication from hard learning problemsEfficient Quantum Algorithms for Testing Symmetries of Open Quantum SystemsTracing quantum state distinguishers via backtrackingOn concurrent multi-party quantum computationCryptography with certified deletionPost-quantum verification of Fujisaki-OkamotoQuantum cryptography beyond quantum key distributionMaking Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum AttacksComposable Security in the Bounded-Quantum-Storage ModelPost-quantum resettably-sound zero knowledgeThe round complexity of quantum zero-knowledgeRelationships between quantum IND-CPA notionsClassical binding for quantum commitmentsSomewhere statistical soundness, post-quantum security, and SNARGsEXPONENTIAL IMPROVEMENT IN PRECISION FOR SIMULATING SPARSE HAMILTONIANSComplexity equals anything. II.On the time dependence of holographic complexityProtocols for quantum binary votingCircuit complexity in quantum field theoryGeneralized Quantum Arthur--Merlin GamesHolographic complexity equals which action?A framework for non-interactive instance-dependent commitment schemes (NIC)Fully Simulatable Quantum-Secure Coin-Flipping and ApplicationsQuantum Commitments from Complexity AssumptionsEverlasting multi-party computationQuantum protocols for zero-knowledge systemsFaithful squashed entanglementUnnamed ItemGeneral Properties of Quantum Zero-Knowledge ProofsHow to achieve perfect simulation and a complete problem for non-interactive perfect zero-knowledgeSubsystem complexity after a global quantum quenchMeasure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA securityEfficient simulation of random states and random unitariesThreshold ring signatures: new definitions and post-quantum securityPost-quantum multi-party computationOblivious transfer is in MiniQCryptClassical proofs of quantum knowledgeSemantic Security and Indistinguishability in the Quantum WorldHolographic complexity for defects distinguishes action from volumeHolographic complexity and de Sitter spaceQuantum generalizations of the polynomial hierarchy with applications to \(\mathrm{QMA(2)}\)A Post-quantum Digital Signature Scheme Based on Supersingular IsogeniesNon-interactive zero-knowledge arguments for QMA, with preprocessingQMA-Hardness of Consistency of Local Density Matrices with Applications to Quantum Zero-KnowledgeQuantum commitments from complexity assumptionsQuantum indistinguishability for public key encryption




This page was built for publication: Zero-knowledge against quantum attacks