Skip to main content

Questions tagged [cryptography]

For questions about cryptography as it relates directly to quantum computing. Not for general cryptographic methods.

0 votes
0 answers
26 views

In classical cryptographic security proofs, leakage or side information is typically modeled as classical and efficiently computable. In post-quantum cryptography, however, an adversary may hold ...
Pustam Raut's user avatar
2 votes
0 answers
31 views

In cryptographic literature, the terms post-quantum secure and secure against quantum adversaries are sometimes used interchangeably, but in other places they appear to refer to distinct notions. My ...
Pustam Raut's user avatar
2 votes
1 answer
339 views

I’ve recently written a short note proving a structural property of Shor’s factoring algorithm, and I’d like feedback from those more experienced in quantum algorithms. Key result: If a base a is ...
Muhammad Saad Bhatti's user avatar
1 vote
1 answer
101 views

https://www.eff.org/dice If capable quantum computers were around would they be able to run a successful bruit force attack on the eff dice psswrd generator? My learning has been regardless of its ...
user3212473's user avatar
2 votes
1 answer
144 views

In Simon's problem, we are given a description of a function $f(x)$ where $f: \{0,1\}^n \to \{0,1\}^m, \; m \geq n-1$. We are also promised that there is a non-zero string $s\in\{0,1\}^n$ such that $f(...
Mark Spinelli's user avatar
1 vote
1 answer
110 views

I'm looking for a way to classify computational problems based on how suitable they are for quantum computers. Specifically, is there an established metric, definition, or framework that categorizes ...
user's user avatar
  • 111
2 votes
2 answers
849 views

A cryptographic scheme using a $n$-bit key to hide a $m$-bit plaintext is said to be perfectly secret when, without this key, we cannot get any information about the plaintext from the ciphertext. ...
Lysandre Terrisse's user avatar
6 votes
1 answer
212 views

Consider being given a circuit for a two-to-one Boolean function $f$ from $n$ (qu)bits to $m\ge n-1$ (qu)bits, and prepare the following state: $$\frac{1}{\sqrt {2^n}}\sum_0^{2^n-1}|x\rangle|f(x)\...
Mark Spinelli's user avatar
1 vote
1 answer
209 views

In Mahadev's protocols, the idea is for a classical verifier to use post-quantum cryptography to check a quantum prover. This allows for various tasks from randomness certification to delegated ...
Bartus's user avatar
  • 13
3 votes
1 answer
150 views

In the BB84 QKD or similar protocol, we know that eavesdropping or interception during secret key generation can be detected, prompting both parties to discard the transaction and attempt a new one. ...
Azad Prajapat's user avatar
0 votes
1 answer
57 views

In Acin's paper (arXiv), it is mentioned that, given Eve chooses to do a collective attack (which roughly means Eve applies the same attack to each system of Alice and Bob, and that the devices with ...
Pratham Hullamballi's user avatar
2 votes
0 answers
57 views

I am an electrical engineering by trade, working on the analogue part (Transmitter & Receiver) of a quantum optical communication channel. By this, I mean I have not much experience on things ...
JustASneakyLittleMushroom's user avatar
2 votes
0 answers
85 views

I'm exploring quantum attacks (in the Q1 model) on symmetric structures, including hash functions, block ciphers, modes of operation and stream ciphers with time complexity beyond quadratic speedup. I'...
user avatar
1 vote
0 answers
44 views

I'm reading this paper: On the construction of quantum circuits for S-boxes with different criteria based on the SAT solver. Here's the link: https://eprint.iacr.org/2024/565.pdf#page=29&zoom=100,...
Huy By's user avatar
  • 133
3 votes
1 answer
101 views

Considering, in a perfect world everyone has the capability to create a quantum key. What would the benefits of using quantum encrypted keys instead of using classically encrypted keys? Besides the ...
Snarz's user avatar
  • 31

15 30 50 per page
1
2 3 4 5
11