Skip to main content

Questions tagged [quantum-cryptography]

Quantum cryptography describes the use of quantum mechanical effects to perform cryptographic tasks. This is not to be confused with quantum computing or cryptanalysis techniques such as Shor's algorithm.

2 votes
2 answers
149 views

Suppose there is an oracle to which a random sequence is given. This sequence is either from a classical source or a quantum source. Assume that $n$ distinct random sequences are given to the oracle, ...
R_Emad's user avatar
  • 535
1 vote
0 answers
31 views

I am a novice quantum cryptography enthusiast writing on the topic for a short dissertation, so please forgive me if I make any incorrect assumptions or ask ignorant questions. I recently came across ...
WRC's user avatar
  • 11
2 votes
0 answers
97 views

I was studying the paper "One Shot Signatures and Applications to Hybrid Quantum/Classical Authentication." In it, the authors define "equivocal hashing" and provide a construction ...
woah's user avatar
  • 89
1 vote
1 answer
114 views

I am trying to understand how BFV leveled scheme is different from BGV leveled scheme? Is the difference in the noise management techniques? Do we have modulus chain for BFV as well? how do we do ...
Green Amber's user avatar
2 votes
0 answers
60 views

Current memory hard key derivation techniques rely on functions that allow for serialisation on tiny memory, except for requiring a quadratic time penalty. But, with Quantum's light-speed defying ...
caveman's user avatar
  • 721
2 votes
1 answer
166 views

It is well-known that unconditional quantum bit commitment is impossible [1, 2, 3]. So I wonder if there is a direct proof for the classical case. Note that any classical protocol can be treated as a ...
Jiawei Wu's user avatar
1 vote
1 answer
128 views

For a practical QKD implementation where OTP has been chosen for encrypting, how are key sizes determined? Say, for example, Alice wishes to exchange xGB to Bob, then a key management system should ...
Niall Canavan's user avatar
3 votes
2 answers
962 views

I don't understand why discrete logarithm is not quantum proof. I understand that quantum computer can quickly compute the exponent, but there is a modulo in the equation. Doesn't it mean, that there ...
pepa z depa's user avatar
2 votes
1 answer
239 views

In the Quantum One Time Pad, an $n$-qubit quantum state can be perfectly encrypted (as in the classical OTP) using $2n$ classical bits. In the classical OTP, I'm allowed to send many times the ...
manta's user avatar
  • 87
3 votes
1 answer
159 views

The usual hybrid argument tells us that if two efficiently sampled ensembles are computationally indistinguishable based on a single sample, then, computational indistinguishability holds even for ...
manta's user avatar
  • 87
0 votes
0 answers
147 views

What are the theoretical usage limits of Kyber and Dilithium? Are there any sources to back this up? Maximum number of encryptions/signatures allowed per key, etc.?
Joe's user avatar
  • 83
1 vote
1 answer
104 views

I am reading the paper Pseudorandom Quantum States,where the following candidate was shown to be a Pseudorandom state, called the complex random phase state: $\mathrm{PRF}_k:X → X$ be a keyed ...
bluebird's user avatar
2 votes
1 answer
209 views

I am reviewing the ZKP course, represented by the university of Berkley (https://zk-learning.org/). In pages 41 and 42 of lecture 6 that is attached below (https://zk-learning.org/assets/lecture6.pdf),...
tesoke's user avatar
  • 181
3 votes
1 answer
109 views

I am working with lossy ID-schemes and their security in the QROM. Following the article of Kiltz et al. , I am at a loss of the number 8 appearing in most reductions throughout the article. I know it ...
Rory's user avatar
  • 353
2 votes
1 answer
791 views

Bilinear Pairings are widely used in many new schemes like Group Signature and Aggregate Signature. The problem is whether it is post-quantum secure. In other words, does Bilinear Diffie-Hellman ...
Chunchi Liu's user avatar

15 30 50 per page
1
2 3 4 5
10