Annual International Cryptology Conference最新文献

筛选
英文 中文
Simple Tests of Quantumness Also Certify Qubits 量子的简单测试也证明量子位
Annual International Cryptology Conference Pub Date : 2023-03-02 DOI: 10.1007/978-3-031-38554-4_6
Zvika Brakerski, A. Gheorghiu, Gregory D. Kahanamoku-Meyer, Eitan Porat, Thomas Vidick
{"title":"Simple Tests of Quantumness Also Certify Qubits","authors":"Zvika Brakerski, A. Gheorghiu, Gregory D. Kahanamoku-Meyer, Eitan Porat, Thomas Vidick","doi":"10.1007/978-3-031-38554-4_6","DOIUrl":"https://doi.org/10.1007/978-3-031-38554-4_6","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125796059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Black-Hole Radiation Decoding is Quantum Cryptography 黑洞辐射解码是量子密码学
Annual International Cryptology Conference Pub Date : 2022-11-10 DOI: 10.48550/arXiv.2211.05491
Zvika Brakerski
{"title":"Black-Hole Radiation Decoding is Quantum Cryptography","authors":"Zvika Brakerski","doi":"10.48550/arXiv.2211.05491","DOIUrl":"https://doi.org/10.48550/arXiv.2211.05491","url":null,"abstract":"We propose to study equivalence relations between phenomena in high-energy physics and the existence of standard cryptographic primitives, and show the first example where such an equivalence holds. A small number of prior works showed that high-energy phenomena can be explained by cryptographic hardness. Examples include using the existence of one-way functions to explain the hardness of decoding black-hole Hawking radiation (Harlow and Hayden 2013, Aaronson 2016), and using pseudorandom quantum states to explain the hardness of computing AdS/CFT dictionary (Bouland, Fefferman and Vazirani, 2020). In this work we show, for the former example of black-hole radiation decoding, that it also implies the existence of secure quantum cryptography. In fact, we show an existential equivalence between the hardness of black-hole radiation decoding and a variety of cryptographic primitives, including bit-commitment schemes and oblivious transfer protocols (using quantum communication). This can be viewed (with proper disclaimers, as we discuss) as providing a physical justification for the existence of secure cryptography. We conjecture that such connections may be found in other high-energy physics phenomena.","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PAC Privacy: Automatic Privacy Measurement and Control of Data Processing PAC隐私:数据处理的自动隐私测量和控制
Annual International Cryptology Conference Pub Date : 2022-10-07 DOI: 10.1007/978-3-031-38545-2_20
Hanshen Xiao, S. Devadas
{"title":"PAC Privacy: Automatic Privacy Measurement and Control of Data Processing","authors":"Hanshen Xiao, S. Devadas","doi":"10.1007/978-3-031-38545-2_20","DOIUrl":"https://doi.org/10.1007/978-3-031-38545-2_20","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115614243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Round Complexity of Secure Quantum Computation 安全量子计算的轮复杂度研究
Annual International Cryptology Conference Pub Date : 2020-11-23 DOI: 10.1007/978-3-030-84242-0_15
James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
{"title":"On the Round Complexity of Secure Quantum Computation","authors":"James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma","doi":"10.1007/978-3-030-84242-0_15","DOIUrl":"https://doi.org/10.1007/978-3-030-84242-0_15","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123031243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Rounding in the Rings 环上的四舍五入
Annual International Cryptology Conference Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56880-1_11
Feng-Hao Liu, Zhedong Wang
{"title":"Rounding in the Rings","authors":"Feng-Hao Liu, Zhedong Wang","doi":"10.1007/978-3-030-56880-1_11","DOIUrl":"https://doi.org/10.1007/978-3-030-56880-1_11","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114552269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Fully Deniable Interactive Encryption 完全可否认的交互式加密
Annual International Cryptology Conference Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56784-2_27
R. Canetti, Sunoo Park, Oxana Poburinnaya
{"title":"Fully Deniable Interactive Encryption","authors":"R. Canetti, Sunoo Park, Oxana Poburinnaya","doi":"10.1007/978-3-030-56784-2_27","DOIUrl":"https://doi.org/10.1007/978-3-030-56784-2_27","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131934587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
New Techniques for Traitor Tracing: Size N1/3 and More from Pairings 追踪叛徒的新技术:n /3及以上的配对
Annual International Cryptology Conference Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56784-2_22
Mark Zhandry
{"title":"New Techniques for Traitor Tracing: Size N1/3 and More from Pairings","authors":"Mark Zhandry","doi":"10.1007/978-3-030-56784-2_22","DOIUrl":"https://doi.org/10.1007/978-3-030-56784-2_22","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125152143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Interactive Proofs for Social Graphs 社交图的交互式证明
Annual International Cryptology Conference Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56877-1_20
L. Katzir, C. Shikhelman, E. Yogev
{"title":"Interactive Proofs for Social Graphs","authors":"L. Katzir, C. Shikhelman, E. Yogev","doi":"10.1007/978-3-030-56877-1_20","DOIUrl":"https://doi.org/10.1007/978-3-030-56877-1_20","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114075730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Summation-Truncation Hybrid: Reusing Discarded Bits for Free 求和-截断混合:免费重用丢弃的位
Annual International Cryptology Conference Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56784-2_7
Aldo Gunsing, Bart Mennink
{"title":"The Summation-Truncation Hybrid: Reusing Discarded Bits for Free","authors":"Aldo Gunsing, Bart Mennink","doi":"10.1007/978-3-030-56784-2_7","DOIUrl":"https://doi.org/10.1007/978-3-030-56784-2_7","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132772189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence 光滑kl散度下部分可模拟交互参数的紧并行重复定理
Annual International Cryptology Conference Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56877-1_19
Itay Berman, Iftach Haitner, Eliad Tsfadia
{"title":"A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence","authors":"Itay Berman, Iftach Haitner, Eliad Tsfadia","doi":"10.1007/978-3-030-56877-1_19","DOIUrl":"https://doi.org/10.1007/978-3-030-56877-1_19","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"519 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116261331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信