ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2111.08665
44
7
v1v2v3 (latest)

Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round

16 November 2021
Nai-Hui Chia
Kai-Min Chung
Xiao Liang
Takashi Yamakawa
ArXiv (abs)PDFHTML
Abstract

From the minimal assumption of post-quantum semi-honest oblivious transfers, we build the first ϵ\epsilonϵ-simulatable two-party computation (2PC) against quantum polynomial-time (QPT) adversaries that is both constant-round and black-box (for both the construction and security reduction). A recent work by Chia, Chung, Liu, and Yamakawa (FOCS'21) shows that post-quantum 2PC with standard simulation-based security is impossible in constant rounds, unless either NP⊆BQP\mathbf{NP} \subseteq \mathbf{BQP}NP⊆BQP or relying on non-black-box simulation. The ϵ\epsilonϵ-simulatability we target is a relaxation of the standard simulation-based security that allows for an arbitrarily small noticeable simulation error ϵ\epsilonϵ. Moreover, when quantum communication is allowed, we can further weaken the assumption to post-quantum secure one-way functions (PQ-OWFs), while maintaining the constant-round and black-box property. Our techniques also yield the following set of constant-round and black-box two-party protocols secure against QPT adversaries, only assuming black-box access to PQ-OWFs: - extractable commitments for which the extractor is also an ϵ\epsilonϵ-simulator; - ϵ\epsilonϵ-zero-knowledge commit-and-prove whose commit stage is extractable with ϵ\epsilonϵ-simulation; - ϵ\epsilonϵ-simulatable coin-flipping; - ϵ\epsilonϵ-zero-knowledge arguments of knowledge for NP\mathbf{NP}NP for which the knowledge extractor is also an ϵ\epsilonϵ-simulator; - ϵ\epsilonϵ-zero-knowledge arguments for QMA\mathbf{QMA}QMA. At the heart of the above results is a black-box extraction lemma showing how to efficiently extract secrets from QPT adversaries while disturbing their quantum state in a controllable manner, i.e., achieving ϵ\epsilonϵ-simulatability of the after-extraction state of the adversary.

View on arXiv
Comments on this paper