A Note on Output Length of One-Way State Generators and EFIs (2312.16025v4)
Abstract: We study the output length of one-way state generators (OWSGs), their weaker variants, and EFIs. - Standard OWSGs. Recently, Cavalar et al. (arXiv:2312.08363) give OWSGs with $m$-qubit outputs for any $m=\omega(\log \lambda)$, where $\lambda$ is the security parameter, and conjecture that there do not exist OWSGs with $O(\log \log \lambda)$-qubit outputs. We prove their conjecture in a stronger manner by showing that there do not exist OWSGs with $O(\log \lambda)$-qubit outputs. This means that their construction is optimal in terms of output length. - Inverse-polynomial-advantage OWSGs. Let $\epsilon$-OWSGs be a parameterized variant of OWSGs where a quantum polynomial-time adversary's advantage is at most $\epsilon$. For any constant $c\in \mathbb{N}$, we construct $\lambda{-c}$-OWSGs with $((c+1)\log \lambda+O(1))$-qubit outputs assuming the existence of OWFs. We show that this is almost tight by proving that there do not exist $\lambda{-c}$-OWSGs with at most $(c\log \lambda-2)$-qubit outputs. - Constant-advantage OWSGs. For any constant $\epsilon>0$, we construct $\epsilon$-OWSGs with $O(\log \log \lambda)$-qubit outputs assuming the existence of subexponentially secure OWFs. We show that this is almost tight by proving that there do not exist $O(1)$-OWSGs with $((\log \log \lambda)/2+O(1))$-qubit outputs. - Weak OWSGs. We refer to $(1-1/\mathsf{poly}(\lambda))$-OWSGs as weak OWSGs. We construct weak OWSGs with $m$-qubit outputs for any $m=\omega(1)$ assuming the existence of exponentially secure OWFs with linear expansion. We show that this is tight by proving that there do not exist weak OWSGs with $O(1)$-qubit outputs. - EFIs. We show that there do not exist $O(\log \lambda)$-qubit EFIs. We show that this is tight by proving that there exist $\omega(\log \lambda)$-qubit EFIs assuming the existence of exponentially secure PRGs.
- Pseudorandom (function-like) quantum state generators: New definitions and applications. TCC, 2022.
- Quantum versus classical proofs and advice. Theory OF Computing, 3:129–157, 2007.
- Pseudorandom strings from pseudorandom quantum states. Cryptology ePrint Archive, Paper 2023/904, 2023. https://eprint.iacr.org/2023/904.
- Cryptography from pseudorandom quantum states. In Yevgeniy Dodis and Thomas Shrimpton, editors, CRYPTO 2022, Part I, volume 13507 of LNCS, pages 208–236. Springer, Heidelberg, August 2022.
- Alice and Bob meet Banach, volume 223. American Mathematical Soc., 2017.
- On the computational hardness needed for quantum cryptography. ITCS 2023, 2023.
- Quantum fingerprinting. Phys. Rev. Lett., 87:167902, 2001.
- Random oracles in a quantum world. In Dong Hoon Lee and Xiaoyun Wang, editors, ASIACRYPT 2011, volume 7073 of LNCS, pages 41–69. Springer, Heidelberg, December 2011.
- A criterion for attaining the welch bounds with applications for mutually unbiased bases. In Jacques Calmet, Willi Geiselmann, and Jörn Müller-Quade, editors, Mathematical Methods in Computer Science, MMICS 2008, Karlsruhe, Germany, December 17-19, 2008 - Essays in Memory of Thomas Beth, volume 5393 of Lecture Notes in Computer Science, pages 50–69. Springer, 2008.
- Scalable pseudorandom quantum states. In Daniele Micciancio and Thomas Ristenpart, editors, CRYPTO 2020, Part II, volume 12171 of LNCS, pages 417–440. Springer, Heidelberg, August 2020.
- On the computational hardness of quantum one-wayness. arXiv:2312.08363, 2023.
- Perfectly concealing quantum bit commitment from any quantum one-way permutation. In Bart Preneel, editor, EUROCRYPT 2000, volume 1807 of LNCS, pages 300–315. Springer, Heidelberg, May 2000.
- Oded Goldreich. A note on computational indistinguishability. Information Processing Letters 34.6 (1990), pp.277–281., 1990.
- Oded Goldreich. The Foundations of Cryptography - Volume 1: Basic Techniques. Cambridge University Press, 2001.
- From the hardness of detecting superpositions to cryptography: Quantum public key encryption and commitments. In Carmit Hazay and Martijn Stam, editors, EUROCRYPT 2023, Part I, volume 14004 of LNCS, pages 639–667. Springer, Heidelberg, April 2023.
- One-way functions are essential for complexity based cryptography (extended abstract). In 30th FOCS, pages 230–235. IEEE Computer Society Press, October / November 1989.
- Pseudo-random generation from one-way functions (extended abstracts). In 21st ACM STOC, pages 12–24. ACM Press, May 1989.
- Pseudorandom quantum states. In Hovav Shacham and Alexandra Boldyreva, editors, CRYPTO 2018, Part III, volume 10993 of LNCS, pages 126–152. Springer, Heidelberg, August 2018.
- Quantum cryptography in algorithmica. STOC, 2023.
- W. Kretschmer. Quantum pseudorandomness and classical complexity. TQC 2021, 2021.
- A one-query lower bound for unitary synthesis and breaking quantum cryptography. Cryptology ePrint Archive, Paper 2023/1602, 2023. https://eprint.iacr.org/2023/1602.
- Angus Lowe. Learning quantum states without entangled measurements. Master’s thesis, University of Waterloo, 2021.
- Pseudo-random permutation generators and cryptographic composition. In 18th ACM STOC, pages 356–363. ACM Press, May 1986.
- One-wayness in quantum cryptography. Cryptology ePrint Archive, Paper 2022/1336, 2022. https://eprint.iacr.org/2022/1336.
- Quantum commitments and signatures without one-way functions. In Yevgeniy Dodis and Thomas Shrimpton, editors, CRYPTO 2022, Part I, volume 13507 of LNCS, pages 269–295. Springer, Heidelberg, August 2022.
- Quantum Computation and Quantum Information. Cambridge University Press, 2010.
- A E Rastegin. Trace distance from the viewpoint of quantum operation techniques. Journal of Physics A: Mathematical and Theoretical, 40(31):9533–9549, jul 2007.
- L. Welch. Lower bounds on the maximum cross correlation of signals (corresp.). IEEE Transactions on Information Theory, 20(3):397–399, 1974.
- Jun Yan. General properties of quantum bit commitments (extended abstract). In Shweta Agrawal and Dongdai Lin, editors, ASIACRYPT 2022, Part IV, volume 13794 of LNCS, pages 628–657. Springer, Heidelberg, December 2022.
- Andrew Chi-Chih Yao. Theory and applications of trapdoor functions (extended abstract). In 23rd FOCS, pages 80–91. IEEE Computer Society Press, November 1982.