Controlled-query security for PRUs
Determine whether the PFC-based pseudorandom unitary construction remains secure when the distinguisher has controlled access to the unitary (i.e., access to controlled-U operations), by proving computational indistinguishability from Haar-random unitaries under controlled query access.
Sponsor
References
Proving security with controlled access to the unitary is similarly unclear.
— Simple constructions of linear-depth t-designs and pseudorandom unitaries
(2404.12647 - Metger et al., 19 Apr 2024) in Section 7 (Discussion and future directions)