We consider the problem of efficiently simulating random quantum states and random unitary operators, in a manner which is convincing to unbounded adversaries with black-box oracle access.This problem has previously only been considered for restricted adversaries. Against adversaries with an a priori bound on the number of queries, it is well-known that t-designs suffice. Against polynomial-time adversaries, one can use pseudorandom states (PRS) and pseudorandom unitaries (PRU), as defined in a recent work of Ji, Liu, and Song; unfortunately, no provably secure construction is known for PRUs. In our setting, we are concerned with unbounded adversaries. Nonetheless, we are able to give stateful quantum algorithm...
We give a protocol for producing certifiable randomness from a single untrusted quantum device that ...
The Unitary Synthesis Problem (Aaronson-Kuperberg 2007) asks whether any $n$-qubit unitary $U$ can b...
Randomness extractors are an important building block for classical and quantum cryptography. Howeve...
We consider the problem of efficiently simulating random quantum states and random unitar...
© International Association for Cryptologic Research 2018. We propose the concept of pseudorandom qu...
We investigate the generation of quantum states and unitary operations that are ``random'' in certai...
We propose the concept of pseudorandom quantum states, which appear random to any quantum polynomial...
Randomness is both a useful way to model natural systems and a useful tool for engineered systems, e...
htmlabstractThe interest in post-quantum cryptography - classical systems that remain secure in the ...
Pseudorandom quantum states (PRS) are efficiently constructible states that are computationally indi...
We show the following: a randomly chosen pure state as a resource for measurement-based quantum comp...
We construct a quantum oracle relative to which BQP = QMA but cryptographic pseudorandom quantum sta...
Game-playing proofs constitute a powerful framework for classical cryptographic security arguments, ...
International audienceRandom access coding is an information task that has been extensively studied ...
The construction of a perfectly secure private quantum channel in dimension d is known to require 2 ...
We give a protocol for producing certifiable randomness from a single untrusted quantum device that ...
The Unitary Synthesis Problem (Aaronson-Kuperberg 2007) asks whether any $n$-qubit unitary $U$ can b...
Randomness extractors are an important building block for classical and quantum cryptography. Howeve...
We consider the problem of efficiently simulating random quantum states and random unitar...
© International Association for Cryptologic Research 2018. We propose the concept of pseudorandom qu...
We investigate the generation of quantum states and unitary operations that are ``random'' in certai...
We propose the concept of pseudorandom quantum states, which appear random to any quantum polynomial...
Randomness is both a useful way to model natural systems and a useful tool for engineered systems, e...
htmlabstractThe interest in post-quantum cryptography - classical systems that remain secure in the ...
Pseudorandom quantum states (PRS) are efficiently constructible states that are computationally indi...
We show the following: a randomly chosen pure state as a resource for measurement-based quantum comp...
We construct a quantum oracle relative to which BQP = QMA but cryptographic pseudorandom quantum sta...
Game-playing proofs constitute a powerful framework for classical cryptographic security arguments, ...
International audienceRandom access coding is an information task that has been extensively studied ...
The construction of a perfectly secure private quantum channel in dimension d is known to require 2 ...
We give a protocol for producing certifiable randomness from a single untrusted quantum device that ...
The Unitary Synthesis Problem (Aaronson-Kuperberg 2007) asks whether any $n$-qubit unitary $U$ can b...
Randomness extractors are an important building block for classical and quantum cryptography. Howeve...