# Zero-Knowledge against Quantum Attacks

## Abstract

### MSC codes

### Keywords

## Get full access to this article

View all available purchase options and get full access to this article.

## References

*A quantum Goldreich-Levin theorem with cryptographic applications*, in Proceedings of the 19th International Symposium on Theoretical Aspects of Computer Science, Lecture Notes in Comput. Sci. 2285, Springer-Verlag, New York, 2002, pp. 323–334.

*Quantum circuits with mixed states*, in Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, ACM, New York, 1998, pp. 20–30.

*Complexity Theory: A Modern Approach*, http://www.cs.princeton. edu/theory/complexity/ (2006).

*Quantum cryptography: Public key distribution and coin tossing*, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, IEEE Computer Society, Los Alamitos, CA, 1984, pp. 175–179.

*Matrix Analysis*, Springer-Verlag, New York, 1997.

*Fortsch. Phys.*, 46 (1998), pp. 493–505.

*J. Comput. System Sci.*, 37 (1988), pp. 156–189.

*Quantum amplitude amplification and estimation*, in Quantum Computation and Quantum Information: A Millennium Volume, Contemp. Math. 305, AMS, Providence, RI, 2002, pp. 53–74.

*Zero-knowledge proofs and string commitments withstanding quantum attacks*, in Advances in Cryptology—CRYPTO 2004: 24th Annual International Cryptology Conference, Lecture Notes in Comput. Sci. 3152, Springer-Verlag, New York, 2004, pp. 254–272.

*Inform. and Control*, 61 (1984), pp. 159–173.

*Phys. Rev. A (3)*, 53 (1996), pp. 2038–2045.

*IEEE Trans. Inform. Theory*, 45 (1999), pp. 1216–1227.

*Foundations of Cryptography: Volume*1

*—Basic Tools*, Cambridge University Press, Cambridge, UK, 2001.

*On Promise Problems (a Survey in Memory of Shimon Even*[1935–2004]), Electronic Colloquium on Computational Complexity, Report TR05-018, 2005.

*J. Comput. System Sci.*, 60 (2000), pp. 540–563.

*SIAM J. Comput.*, 25 (1996), pp. 169–192.

*J. Assoc. Comput. Mach.*, 38 (1991), pp. 691–729.

*Honest verifier statistical zero knowledge equals general statistical zero knowledge*, in Proceedings of the 30th Annual ACM Symposium on Theory of Computing, ACM, New York, 1998, pp. 23–26.

*Comparing entropies in statistical zero-knowledge with applications to the structure of SZK*, in Proceedings of the 14th Annual IEEE Conference on Computational Complexity, IEEE Computer Society, Los Alamitos, CA, 1999, pp. 54–73.

*SIAM J. Comput.*, 18 (1989), pp. 186–208.

*Towards a Formal Definition of Security for Quantum Protocols*, Ph.D. thesis, Université de Montréal, Montreal, Canada, 1997.

*A fast quantum mechanical algorithm for database search*, in Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, ACM, New York, 1996, pp. 212–219.

*Phys. Rev. Lett.*, 79 (1997), pp. 325–328.

*SIAM J. Comput.*, 28 (1999), pp. 1364–1396.

*n*dimensions,

*Bull. Soc. Math. France*, 3 (1875), pp. 103–174.

*Russian Math. Surveys*, 52 (1997), pp. 1191–1249.

*Classical and Quantum Computation*, Grad. Stud. Math. 47, AMS, Providence, RI, 2002.

*Parallelization, amplification, and exponential time simulation of quantum interactive proof system*, in Proceedings of the 32nd ACM Symposium on Theory of Computing, ACM, New York, 2000, pp. 608–617.

*Non-interactive quantum perfect and statistical zero-knowledge*, in ISAAC 2003: Proceedings of the 14th International Symposium on Algorithms and Computation, Lecture Notes in Comput. Sci. 2906, Springer-Verlag, New York, 2003, pp. 178–188.

*Phys. Rev. Lett.*, 78 (1997), pp. 3410–3413.

*Comput. Complexity*, 14 (2005), pp. 122–152.

*A Simpler Proof of Zero-Knowledge against Quantum Attacks Using Grover's Amplitude Amplification*, http://arxiv.org/abs/quant-ph/0602186 (2006).

*Phys. Rev. Lett.*, 78 (1997), pp. 3414–3417.

*J. ACM*, 48 (2001), pp. 351–406.

*A Classical One-Way Function to Confound Quantum Adversaries*, http://arxiv.org/abs/quant-ph/0701115 (2007).

*J. Cryptology*, 4 (1991), pp. 151–158.

*Quantum Computation and Quantum Information*, Cambridge University Press, Cambridge, UK, 2000.

*Computational Complexity*, Addison–Wesley, Reading, MA, 1994.

*private communication*, 2006.

*Comm. ACM*, 21 (1978), pp. 120–126.

*J. ACM*, 50 (2003), pp. 196–249.

*SIAM J. Comput.*, 26 (1997), pp. 1484–1509.

*Phys. Rev. Lett.*, 85 (2000), pp. 441–444.

*Limits on the power of quantum statistical zero-knowledge*, in Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society, Los Alamitos, CA, 2002, pp. 459–468.

*Zero-knowledge against quantum attacks*, in Proceedings of the 38th ACM Symposium on Theory of Computing, ACM, New York, 2006, pp. 296–305.

*Nature*, 299 (1982), pp. 802–803.

## Information & Authors

### Information

#### Published In

#### Copyright

#### History

**Submitted**: 28 September 2006

**Accepted**: 18 June 2007

**Published online**: 28 May 2009

#### MSC codes

#### Keywords

### Authors

## Metrics & Citations

### Metrics

### Citations

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

#### Cited By

- Quantum Pufferfish Privacy: A Flexible Privacy Framework for Quantum SystemsIEEE Transactions on Information Theory, Vol. 70, No. 8 | 1 Aug 2024
- Post-Quantum Sound CryptoVerif and Verification of Hybrid TLS and SSH Key-Exchanges2024 IEEE 37th Computer Security Foundations Symposium (CSF) | 8 Jul 2024
- Watermarking PRFs and PKE Against Quantum AdversariesJournal of Cryptology, Vol. 37, No. 3 | 26 April 2024
- An Efficient Quantum Parallel Repetition Theorem and ApplicationsProceedings of the 56th Annual ACM Symposium on Theory of Computing | 11 June 2024
- Quantum copy-protection of compute-and-compare programs in the quantum random oracle modelQuantum, Vol. 8 | 2 May 2024
- Quantum Bit Commitment Without Quantum MemoryThe Computer Journal, Vol. 67, No. 3 | 17 May 2023
- Fast Quantum Algorithms for Trace Distance EstimationIEEE Transactions on Information Theory, Vol. 70, No. 4 | 1 Apr 2024
- Unconditionally Secure Commitments with Quantum Auxiliary InputsAdvances in Cryptology – CRYPTO 2024 | 18 August 2024
- Guest Column: The 7 faces of quantum NPACM SIGACT News, Vol. 54, No. 4 | 3 January 2024
- Estimating distinguishability measures on quantum computersPhysical Review A, Vol. 108, No. 1 | 10 July 2023
- Commitments to Quantum StatesProceedings of the 55th Annual ACM Symposium on Theory of Computing | 2 June 2023
- Oblivious Transfer from Zero-Knowledge ProofsAdvances in Cryptology – ASIACRYPT 2023 | 19 December 2023
- Quantum generalizations of the polynomial hierarchy with applications to QMA(2)computational complexity, Vol. 31, No. 2 | 20 September 2022
- QMA-Hardness of Consistency of Local Density Matrices with Applications to Quantum Zero-KnowledgeSIAM Journal on Computing, Vol. 51, No. 4 | 31 August 2022
- Quantum Security for IoT to Secure Healthcare Applications and Their DataResearch Anthology on Securing Medical Systems and Records | 3 Jun 2022
- A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols2022 IEEE Symposium on Security and Privacy (SP) | 1 May 2022
- Spatial Isolation Implies Zero Knowledge Even in a Quantum WorldJournal of the ACM, Vol. 69, No. 2 | 31 January 2022
- On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Round2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS) | 1 Feb 2022
- Cheating Sensitive Security Quantum Bit Commitment with Security Distance FunctionDigital Forensics and Cyber Crime | 4 June 2022
- Watermarking PRFs Against Quantum AdversariesAdvances in Cryptology – EUROCRYPT 2022 | 25 May 2022
- Non-malleable Commitments Against Quantum AttacksAdvances in Cryptology – EUROCRYPT 2022 | 25 May 2022
- Certified Everlasting Zero-Knowledge Proof for QMAAdvances in Cryptology – CRYPTO 2022 | 12 October 2022
- Post-quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-RoundAdvances in Cryptology – CRYPTO 2022 | 12 October 2022
- Universally Composable $$\varSigma $$-protocols in the Global Random-Oracle ModelTheory of Cryptography | 21 December 2022
- Universal Reductions: Reductions Relative to Stateful OraclesTheory of Cryptography | 21 December 2022
- Eliminating intermediate measurements in space-bounded Quantum computationProceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing | 15 June 2021
- Representation Matching For Remote Quantum ComputingPRX Quantum, Vol. 2, No. 2 | 26 May 2021
- Post-Quantum Multi-Party ComputationAdvances in Cryptology – EUROCRYPT 2021 | 16 June 2021
- Oblivious Transfer Is in MiniQCryptAdvances in Cryptology – EUROCRYPT 2021 | 16 June 2021
- Classical Proofs of Quantum KnowledgeAdvances in Cryptology – EUROCRYPT 2021 | 16 June 2021
- Quantum Indistinguishability for Public Key EncryptionPost-Quantum Cryptography | 15 July 2021
- A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant RoundsAdvances in Cryptology – CRYPTO 2021 | 11 August 2021
- On the Concurrent Composition of Quantum Zero-KnowledgeAdvances in Cryptology – CRYPTO 2021 | 11 August 2021
- Classical Binding for Quantum CommitmentsTheory of Cryptography | 4 November 2021
- Somewhere Statistical Soundness, Post-Quantum Security, and SNARGsTheory of Cryptography | 4 November 2021
- Post-quantum Resettably-Sound Zero KnowledgeTheory of Cryptography | 4 November 2021
- The Round Complexity of Quantum Zero-KnowledgeTheory of Cryptography | 4 November 2021
- Relationships Between Quantum IND-CPA NotionsTheory of Cryptography | 4 November 2021
- Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NPAdvances in Cryptology – ASIACRYPT 2021 | 1 December 2021
- Quantum Security for IoT to Secure Healthcare Applications and Their DataLimitations and Future Applications of Quantum Cryptography | 1 Jan 2021
- QMA-hardness of Consistency of Local Density Matrices with Applications to Quantum Zero-Knowledge2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS) | 1 Nov 2020
- Classical zero-knowledge arguments for quantum computationsQuantum, Vol. 4 | 14 May 2020
- A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networksInternet of Things, Vol. 9 | 1 Mar 2020
- Zero-Knowledge Proof Systems for QMASIAM Journal on Computing, Vol. 49, No. 2 | 10 March 2020
- Threshold Ring Signatures: New Definitions and Post-quantum SecurityPublic-Key Cryptography – PKC 2020 | 29 April 2020
- Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA SecurityAdvances in Cryptology – EUROCRYPT 2020 | 1 May 2020
- Efficient Simulation of Random States and Random UnitariesAdvances in Cryptology – EUROCRYPT 2020 | 1 May 2020
- Non-interactive Zero-Knowledge Arguments for QMA, with PreprocessingAdvances in Cryptology – CRYPTO 2020 | 10 August 2020
- Secure Quantum Extraction ProtocolsTheory of Cryptography | 9 December 2020
- Non-interactive Classical Verification of Quantum ComputationTheory of Cryptography | 9 December 2020
- Post-Quantum Verification of Fujisaki-OkamotoAdvances in Cryptology – ASIACRYPT 2020 | 6 December 2020
- Cyber security in the quantum eraCommunications of the ACM, Vol. 62, No. 4 | 20 March 2019
- Quantum relational Hoare logicProceedings of the ACM on Programming Languages, Vol. 3, No. POPL | 2 January 2019
- Generalized Quantum Arthur--Merlin GamesSIAM Journal on Computing, Vol. 48, No. 3 | 2 May 2019
- Quantum Security of Hash Functions and Property-Preservation of Iterated HashingPost-Quantum Cryptography | 14 July 2019
- Succinct Arguments in the Quantum Random Oracle ModelTheory of Cryptography | 22 November 2019
- Everlasting Multi-party ComputationJournal of Cryptology, Vol. 31, No. 4 | 6 March 2018
- Spatial Isolation Implies Zero Knowledge Even in a Quantum World2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS) | 1 Oct 2018
- A New Three-Pass Code-based Zero-Knowledge Identification Scheme with Cheating Probability of Exactly Half2018 International Symposium on Information Theory and Its Applications (ISITA) | 1 Oct 2018
- Unconditionally secure multi-party quantum commitment schemeQuantum Information Processing, Vol. 17, No. 2 | 29 December 2017
- Quantum Collision-Finding in Non-uniform Random FunctionsPost-Quantum Cryptography | 1 April 2018
- Efficient Authentication from Hard Learning ProblemsJournal of Cryptology, Vol. 30, No. 4 | 9 December 2016
- Quantum security analysis of a lattice-based oblivious transfer protocolFrontiers of Information Technology & Electronic Engineering, Vol. 18, No. 9 | 27 October 2017
- Compression of quantum multi-prover interactive proofsProceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing | 19 June 2017
- Protocols for quantum binary votingInternational Journal of Quantum Information, Vol. 15, No. 01 | 2 February 2017
- Quantum Security of NMAC and Related ConstructionsAdvances in Cryptology – CRYPTO 2017 | 29 July 2017
- A Post-quantum Digital Signature Scheme Based on Supersingular IsogeniesFinancial Cryptography and Data Security | 1 Jan 2017
- EXPONENTIAL IMPROVEMENT IN PRECISION FOR SIMULATING SPARSE HAMILTONIANSForum of Mathematics, Sigma, Vol. 5 | 2 March 2017
- Zero-Knowledge Proof Systems for QMA2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS) | 1 Oct 2016
- Operational meaning of quantum measures of recoveryPhysical Review A, Vol. 94, No. 2 | 10 August 2016
- Quantum commitments from complexity assumptionscomputational complexity, Vol. 25, No. 1 | 29 October 2015
- Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of OperationPost-Quantum Cryptography | 4 February 2016
- Computationally Binding Quantum CommitmentsAdvances in Cryptology – EUROCRYPT 2016 | 28 April 2016
- Semantic Security and Indistinguishability in the Quantum WorldAdvances in Cryptology – CRYPTO 2016 | 21 July 2016
- Collapse-Binding Quantum Commitments Without Random OraclesAdvances in Cryptology – ASIACRYPT 2016 | 9 November 2016
- New Limits to Classical and Quantum Instance CompressionSIAM Journal on Computing, Vol. 44, No. 5 | 27 October 2015
- Stronger Methods of Making Quantum Interactive Proofs Perfectly CompleteSIAM Journal on Computing, Vol. 44, No. 2 | 24 March 2015
- Authenticated Key Exchange from Ideal LatticesAdvances in Cryptology - EUROCRYPT 2015 | 14 April 2015
- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle ModelAdvances in Cryptology - EUROCRYPT 2015 | 14 April 2015
- Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract)Algorithms and Computation | 27 November 2015
- Quantum Attacks on Classical Proof Systems: The Hardness of Quantum Rewinding2014 IEEE 55th Annual Symposium on Foundations of Computer Science | 1 Oct 2014
- A Note on Quantum Security for Post-Quantum CryptographyPost-Quantum Cryptography | 1 Jan 2014
- Quantum computation vs. firewallsJournal of High Energy Physics, Vol. 2013, No. 6 | 21 June 2013
- Two-Message Quantum Interactive Proofs and the Quantum Separability Problem2013 IEEE Conference on Computational Complexity | 1 Jun 2013
- ON THE POWER QUANTUM COMPUTATION OVER REAL HILBERT SPACESInternational Journal of Quantum Information, Vol. 11, No. 01 | 14 May 2013
- Stronger methods of making quantum interactive proofs perfectly completeProceedings of the 4th conference on Innovations in Theoretical Computer Science | 9 January 2013
- Feasibility and Completeness of Cryptographic Tasks in the Quantum WorldTheory of Cryptography | 1 Jan 2013
- Everlasting Multi-party ComputationAdvances in Cryptology – CRYPTO 2013 | 1 Jan 2013
- Introduction of Quantum CryptographyApplied Mechanics and Materials, Vol. 275-277 | 1 January 2013
- Quantum logic gates generated by SC-charge qubits coupled to a resonatorJournal of Physics A: Mathematical and Theoretical, Vol. 45, No. 48 | 19 November 2012
- Complete Problem for Perfect Zero-Knowledge Quantum ProofSOFSEM 2012: Theory and Practice of Computer Science | 1 Jan 2012
- Quantum Proofs of KnowledgeAdvances in Cryptology – EUROCRYPT 2012 | 1 Jan 2012
- QIP = PSPACEJournal of the ACM, Vol. 58, No. 6 | 1 December 2011
- Efficient Authentication from Hard Learning ProblemsAdvances in Cryptology – EUROCRYPT 2011 | 1 Jan 2011
- Quantum Commitments from Complexity AssumptionsAutomata, Languages and Programming | 1 Jan 2011
- Classical Cryptographic Protocols in a Quantum WorldAdvances in Cryptology – CRYPTO 2011 | 1 Jan 2011
- Random Oracles in a Quantum WorldAdvances in Cryptology – ASIACRYPT 2011 | 1 Jan 2011
- QIP = PSPACEProceedings of the forty-second ACM symposium on Theory of computing | 5 June 2010
- Quantum-Secure Coin-Flipping and ApplicationsAdvances in Cryptology – ASIACRYPT 2009 | 1 Jan 2009

## View Options

### Get Access

**Access via your Institution**- Questions about how to access this content? Contact SIAM at
**[email protected]**.