We explore the cryptographic power of arbitrary shared physical resources.
The most general such resource is access to a fresh entangled quantum state at
the outset of each protocol execution. We call this the Common Reference
Quantum State (CRQS) model, in analogy to the well-known Common Reference
String (CRS). The CRQS model is a natural generalization of the CRS model but
appears to be more powerful: in the two-party setting, a CRQS can sometimes
exhibit properties associated with a Random Oracle queried once by measuring a
maximally entangled state in one of many mutually unbiased bases. We formalize
this notion as a Weak One-Time Random Oracle (WOTRO), where we only ask of the
m--bit output to have some randomness when conditioned on the n--bit input.
We show that when n−m∈ω(lgn), any protocol for WOTRO in the CRQS
model can be attacked by an (inefficient) adversary. Moreover, our adversary is
efficiently simulatable, which rules out the possibility of proving the
computational security of a scheme by a black-box reduction to a cryptographic
game assumption. On the other hand, we introduce a non-game quantum assumption
for hash functions that implies WOTRO in the CRQ\model(wheretheCRQSconsistsonlyofEPRpairs).WefirstbuildastatisticallysecureWOTROprotocolwherem=n,thenhashtheoutput.TheimpossibilityofWOTROhasthefollowingconsequences.First,weshowtheblack−boximpossibilityofaquantumFiat−Shamirtransform,extendingtheimpossibilityresultofBitanskyetal.(TCC′13)totheCRQSmodel.Second,weshowablack−boximpossibilityresultforastrenghtenedversionofquantumlightning(Zhandry,Eurocrypt′19)wherequantumboltshaveanadditionalparameterthatcannotbechangedwithoutgeneratingnewbolts.