Cryptography from Pseudorandom Quantum States
نویسندگان
چکیده
Pseudorandom states, introduced by Ji, Liu and Song (Crypto’18), are efficiently-computable quantum states that computationally indistinguishable from Haar-random states. One-way functions imply the existence of pseudorandom but Kretschmer (TQC’20) recently constructed an oracle relative to which there no one-way still exist. Motivated this, we study intriguing possibility basing interesting cryptographic tasks on We construct, assuming state generators map a $$\lambda $$ -bit seed $$\omega (\log \lambda )$$ -qubit state, (a) statistically binding hiding commitments (b) pseudo one-time encryption schemes. A consequence is sufficient construct maliciously secure multiparty computation protocols in dishonest majority setting. Our constructions derived via new notion called function-like (PRFS), generalization parallels classical functions. Beyond above two applications, believe our can effectively replace many other applications.
منابع مشابه
Mixed States in Quantum Cryptography
Mixed states are important in quantum computation and quantum information theories. Each quantum mixed state can be described by its density matrix. We discuss how properties of mixed states and their density matrices can be used to explain fundamentals of most popular quantum computing protocols. By using density matrices we show that some of quantum protocols are safe, but some of them allow ...
متن کاملQuantum Cryptography with Squeezed States
A quantum key distribution scheme based on the use of squeezed states is presented. The states are squeezed in one of two field quadrature components, and the value of the squeezed component is used to encode a character from an alphabet. The uncertainty relation between quadrature components prevents an eavesdropper from determining both with enough precision to determine the character being s...
متن کاملFaked states attack and quantum cryptography protocols
Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols[4], [3], [6], [17]. Despite proving the security in theory, real-world application falls short of the ideal. Last year, cryptanalysts completed an experiment demonstrating a successful eavesdropping attack on commercial quantum key distribution (QKD) systems[12]. This attack exploits a weakness in th...
متن کاملContinuous variable quantum cryptography using coherent states.
We propose several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and we show that they are secure against individual eavesdropping attacks. These protocols require that the transmission of the optical line between Alice and Bob is larger than 50%, but they do not rely on "sub-shot-noise" features such ...
متن کاملQuantum cryptography based on orthogonal states.
All existing quantum cryptosystems use non-orthogonal states as the carriers of information. Non-orthogonal states cannot be cloned (duplicated) by an eavesdropper. In result, any eavesdropping attempt must introduce errors in the transmission, and therefore, can be detected by the legal users of the communication channel. Orthogonal states are not used in quantum cryptography, since they can b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2022
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-15802-5_8