Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Computationally Binding Quantum Commitments - MaRDI portal

Computationally Binding Quantum Commitments

From MaRDI portal
Publication:5739213

DOI10.1007/978-3-662-49896-5_18zbMath1371.94660OpenAlexW2465235335MaRDI QIDQ5739213

Dominique Unruh

Publication date: 15 July 2016

Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-49896-5_18




Related Items (36)

A black-box approach to post-quantum zero-knowledge in constant roundsUnconditionally secure multi-party quantum commitment schemeCollapseability of Tree HashesClassical proofs for the quantum collapsing property of classical hash functionsQuantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptionsA review of quantum and hybrid quantum/classical blockchain protocolsCollapse-Binding Quantum Commitments Without Random OraclesCryptography from pseudorandom quantum statesLattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)Succinct classical verification of quantum computationThe gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functionsA note on the post-quantum security of (ring) signaturesGeneral properties of quantum bit commitments (extended abstract)Black-box separations for non-interactive classical commitments in a quantum worldAnother round of breaking and making quantum money: how to not build it from lattices, and moreFrom the hardness of detecting superpositions to cryptography: quantum public key encryption and commitmentsSemantic embedding for quantum algorithmsQuantum computationally predicate-binding commitments with application in quantum zero-knowledge arguments for NPNew constructions of collapsing hashesSponge-based authenticated encryption: security against quantum attackersPost-quantum insecurity from LWEQuantum rewinding for many-round protocolsUniversal reductions: reductions relative to stateful oraclesPublicly-verifiable deletion via target-collapsing functionsLattice-based timed cryptographyPost-quantum resettably-sound zero knowledgeRelationships between quantum IND-CPA notionsClassical binding for quantum commitmentsAn efficient quantum digital signature for classical messagesVerifying quantum computations at scale: A cryptographic leash on quantum devicesDispelling myths on superposition attacks: formal security model and attack analysesSigma protocols for MQ, PKP and SIS, and fishy signature schemesQuantum-access-secure message authentication via blind-unforgeabilityThe measure-and-reprogram technique 2.0: multi-round Fiat-Shamir and moreImproved lattice-based mix-nets for electronic voting\textsf{CSI-RAShi}: distributed key generation for CSIDH




This page was built for publication: Computationally Binding Quantum Commitments