We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: Powerful Primitives in the Bounded Quantum Storage Model

Abstract: The bounded quantum storage model aims to achieve security against computationally unbounded adversaries that are restricted only with respect to their quantum memories. In this work, we provide information-theoretic secure constructions in this model for the following powerful primitives: (1) CCA1-secure symmetric key encryption, message authentication codes, and one-time programs. These schemes require no quantum memory for the honest user, while they can be made secure against adversaries with arbitrarily large memories by increasing the transmission length sufficiently. (2) CCA1-secure asymmetric key encryption, encryption tokens, signatures, signature tokens, and program broadcast. These schemes are secure against adversaries with roughly $e^{\sqrt{m}}$ quantum memory where $m$ is the quantum memory required for the honest user. All of the constructions additionally satisfy notions of disappearing and unclonable security.
Comments: 57 pages
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
Cite as: arXiv:2302.05724 [cs.CR]
  (or arXiv:2302.05724v3 [cs.CR] for this version)

Submission history

From: Mohammed Barhoush Mr [view email]
[v1] Sat, 11 Feb 2023 15:38:52 GMT (107kb)
[v2] Fri, 26 May 2023 03:16:57 GMT (109kb)
[v3] Tue, 6 Jun 2023 19:53:47 GMT (109kb)

Link back to: arXiv, form interface, contact.