References & Citations
Computer Science > Cryptography and Security
Title: Powerful Primitives in the Bounded Quantum Storage Model
(Submitted on 11 Feb 2023 (v1), last revised 6 Jun 2023 (this version, v3))
Abstract: The bounded quantum storage model aims to achieve security against computationally unbounded adversaries that are restricted only with respect to their quantum memories. In this work, we provide information-theoretic secure constructions in this model for the following powerful primitives: (1) CCA1-secure symmetric key encryption, message authentication codes, and one-time programs. These schemes require no quantum memory for the honest user, while they can be made secure against adversaries with arbitrarily large memories by increasing the transmission length sufficiently. (2) CCA1-secure asymmetric key encryption, encryption tokens, signatures, signature tokens, and program broadcast. These schemes are secure against adversaries with roughly $e^{\sqrt{m}}$ quantum memory where $m$ is the quantum memory required for the honest user. All of the constructions additionally satisfy notions of disappearing and unclonable security.
Submission history
From: Mohammed Barhoush Mr [view email][v1] Sat, 11 Feb 2023 15:38:52 GMT (107kb)
[v2] Fri, 26 May 2023 03:16:57 GMT (109kb)
[v3] Tue, 6 Jun 2023 19:53:47 GMT (109kb)
Link back to: arXiv, form interface, contact.