Multi-theorem (Malicious) Designated-Verifier NIZK for QMA
- URL: http://arxiv.org/abs/2007.12923v1
- Date: Sat, 25 Jul 2020 13:14:49 GMT
- Title: Multi-theorem (Malicious) Designated-Verifier NIZK for QMA
- Authors: Omri Shmueli
- Abstract summary: We present the first non-interactive zero-knowledge argument system for QMA with multi-theorem security.
Our technique is classical but works for quantum protocols and allows the construction of a reusable MDV-NIZK for QMA.
- Score: 4.264192013842096
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We present the first non-interactive zero-knowledge argument system for QMA
with multi-theorem security. Our protocol setup constitutes an additional
improvement and is constructed in the malicious designated-verifier (MDV-NIZK)
model (Quach, Rothblum, and Wichs, EUROCRYPT 2019), where the setup consists of
a trusted part that includes only a common uniformly random string and an
untrusted part of classical public and secret verification keys, which even if
sampled maliciously by the verifier, the zero knowledge property still holds.
The security of our protocol is established under the Learning with Errors
Assumption. Our main technical contribution is showing a general transformation
that compiles any sigma protocol into a reusable MDV-NIZK protocol, using NIZK
for NP. Our technique is classical but works for quantum protocols and allows
the construction of a reusable MDV-NIZK for QMA.
Related papers
- Certified Randomness implies Secure Classical Position-Verification [1.5391321019692432]
We provide a new generic compiler that can convert any single round proof of quantumness-based certified randomness protocol to a secure communication-based position verification scheme.
We instantiate our compiler with a random circuit sampling (RCS)-based certified randomness protocol proposed by Aaronson and Hung (STOC 23)
arXiv Detail & Related papers (2024-10-04T23:49:38Z) - Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Asymmetric Quantum Secure Multi-Party Computation With Weak Clients
Against Dishonest Majority [0.0]
We introduce a protocol that lifts classical SMPC to quantum SMPC in a composably and statistically secure way.
Unlike previous quantum SMPC protocols, our proposal only requires very limited quantum resources from all but one party.
arXiv Detail & Related papers (2023-03-15T18:33:18Z) - Oblivious Transfer from Zero-Knowledge Proofs, or How to Achieve
Round-Optimal Quantum Oblivious Transfer and Zero-Knowledge Proofs on Quantum
States [0.0]
We turn any classical Zero-Knowledge (ZK) protocol into a composable (quantum) oblivious transfer (OT) protocol.
We provide the first round-optimal (2-message) quantum OT protocol secure in the random oracle model.
At the heart of our construction lies a new method that allows us to prove properties on a received quantum state without revealing additional information.
arXiv Detail & Related papers (2023-03-02T18:38:15Z) - From Auditable Quantum Authentication to Best-of-Both-Worlds Multiparty
Quantum Computation with Public Verifiable Identifiable Abort [0.5076419064097734]
We construct the first secure multiparty quantum computation with public verifiable identifiable abort (MPQC-PVIA) protocol.
MPQC is the first quantum setting to provide Best-of-Both-Worlds (BoBW) security, which attains full security with an honest majority.
arXiv Detail & Related papers (2022-11-03T09:12:48Z) - Towards Semantic Communication Protocols: A Probabilistic Logic
Perspective [69.68769942563812]
We propose a semantic protocol model (SPM) constructed by transforming an NPM into an interpretable symbolic graph written in the probabilistic logic programming language (ProbLog)
By leveraging its interpretability and memory-efficiency, we demonstrate several applications such as SPM reconfiguration for collision-avoidance.
arXiv Detail & Related papers (2022-07-08T14:19:36Z) - Scalable Mediated Semi-quantum Key Distribution [5.548873288570182]
Mediated semi-quantum key distribution (M-SQKD) permits two limited "semi-quantum" or "classical" users to establish a secret key with the help of a third party (TP)
Several protocols have been studied recently for two-party scenarios, but no one has considered M-SQKD for multi-party scenarios.
arXiv Detail & Related papers (2022-05-13T09:21:12Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.