Questions tagged [quantum-cryptography]
Quantum cryptography describes the use of quantum mechanical effects to perform cryptographic tasks. This is not to be confused with quantum computing or cryptanalysis techniques such as Shor's algorithm.
143 questions
2 votes
2 answers
149 views
Distinguishing between a random sequence generated from a classical source and a quantum one
Suppose there is an oracle to which a random sequence is given. This sequence is either from a classical source or a quantum source. Assume that $n$ distinct random sequences are given to the oracle, ...
1 vote
0 answers
31 views
Does the use of trusted components align with the strict definition of device-independent quantum key distribution?
I am a novice quantum cryptography enthusiast writing on the topic for a short dissertation, so please forgive me if I make any incorrect assumptions or ask ignorant questions. I recently came across ...
2 votes
0 answers
97 views
One Shot Signatures Equivocal Hash Security Proof
I was studying the paper "One Shot Signatures and Applications to Hybrid Quantum/Classical Authentication." In it, the authors define "equivocal hashing" and provide a construction ...
1 vote
1 answer
114 views
BFV bootstrapping vs leveled scheme
I am trying to understand how BFV leveled scheme is different from BGV leveled scheme? Is the difference in the noise management techniques? Do we have modulus chain for BFV as well? how do we do ...
2 votes
0 answers
60 views
Is there any quantum memory hard key derivation?
Current memory hard key derivation techniques rely on functions that allow for serialisation on tiny memory, except for requiring a quadratic time penalty. But, with Quantum's light-speed defying ...
2 votes
1 answer
166 views
Why is unconditional classical bit commitment impossible?
It is well-known that unconditional quantum bit commitment is impossible [1, 2, 3]. So I wonder if there is a direct proof for the classical case. Note that any classical protocol can be treated as a ...
1 vote
1 answer
128 views
Key size for One Time Pad use with QKD
For a practical QKD implementation where OTP has been chosen for encrypting, how are key sizes determined? Say, for example, Alice wishes to exchange xGB to Bob, then a key management system should ...
3 votes
2 answers
962 views
Why is discrete logarithm not quantum proof?
I don't understand why discrete logarithm is not quantum proof. I understand that quantum computer can quickly compute the exponent, but there is a modulo in the equation. Doesn't it mean, that there ...
2 votes
1 answer
239 views
Quantum many time pad
In the Quantum One Time Pad, an $n$-qubit quantum state can be perfectly encrypted (as in the classical OTP) using $2n$ classical bits. In the classical OTP, I'm allowed to send many times the ...
3 votes
1 answer
159 views
Hybrid argument for quantum states
The usual hybrid argument tells us that if two efficiently sampled ensembles are computationally indistinguishable based on a single sample, then, computational indistinguishability holds even for ...
0 votes
0 answers
147 views
Kyber and Dilithium usage limits?
What are the theoretical usage limits of Kyber and Dilithium? Are there any sources to back this up? Maximum number of encryptions/signatures allowed per key, etc.?
1 vote
1 answer
104 views
Tensor product of Pseudorandom States
I am reading the paper Pseudorandom Quantum States,where the following candidate was shown to be a Pseudorandom state, called the complex random phase state: $\mathrm{PRF}_k:X → X$ be a keyed ...
2 votes
1 answer
209 views
Poly-commitment based on Bulletproofs
I am reviewing the ZKP course, represented by the university of Berkley (https://zk-learning.org/). In pages 41 and 42 of lecture 6 that is attached below (https://zk-learning.org/assets/lecture6.pdf),...
3 votes
1 answer
109 views
Where does the 8 come from? Generic Search Problem with Bounded Probabilities
I am working with lossy ID-schemes and their security in the QROM. Following the article of Kiltz et al. , I am at a loss of the number 8 appearing in most reductions throughout the article. I know it ...
2 votes
1 answer
791 views
Is pairing-based crypto post-quantum secure?
Bilinear Pairings are widely used in many new schemes like Group Signature and Aggregate Signature. The problem is whether it is post-quantum secure. In other words, does Bilinear Diffie-Hellman ...