Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 88 tok/s
Gemini 2.5 Pro 59 tok/s Pro
GPT-5 Medium 31 tok/s Pro
GPT-5 High 30 tok/s Pro
GPT-4o 110 tok/s Pro
Kimi K2 210 tok/s Pro
GPT OSS 120B 461 tok/s Pro
Claude Sonnet 4.5 38 tok/s Pro
2000 character limit reached

A New Approach to Arguments of Quantum Knowledge (2510.05316v1)

Published 6 Oct 2025 in quant-ph

Abstract: We construct a non-interactive zero-knowledge argument system for QMA with the following properties of interest. 1. Transparent setup. Our protocol only requires a uniformly random string (URS) setup. The only prior (publicly-verifiable) NIZK for QMA (Bartusek and Malavolta, ITCS 2022) requires an entire obfuscated program as the common reference string. 2. Extractability. Valid QMA witnesses can be extracted directly from our accepting proofs. That is, we obtain an argument of knowledge, which was previously only known in a secret parameters model (Coladangelo, Vidick, and Zhang, CRYPTO 2020). At the heart of our construction is a novel application of the coset state authentication scheme from (Bartusek, Brakerski, and Vaikuntanathan, STOC 2024) to the setting of QMA verification. Along the way, we establish new properties of the authentication scheme, and design a new type of ZX QMA verifier with ``strong completeness.'' The security of our construction rests on the heuristic use of a post-quantum indistinguishability obfuscator. However, rather than rely on the full-fledged classical oracle model (i.e. ideal obfuscation), we isolate a particular game-based property of the obfuscator that suffices for our proof, which we dub the evasive composability heuristic. Going a step further, we show how to replace the heuristic use of an obfuscator with the heuristic use of a hash function (plus sub-exponentially secure functional encryption). We accomplish this by establishing security of the ideal obfuscation scheme of Jain, Lin, Luo, and Wichs (CRYPTO 2023) in the quantum pseudorandom oracle model, which can be heuristically instantiated with a hash function. This result is of independent interest, and allows us to translate several quantum-cryptographic results that were only known in the classical oracle model to results in the quantum pseudorandom oracle model.

Summary

We haven't generated a summary for this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

X Twitter Logo Streamline Icon: https://streamlinehq.com

Tweets

This paper has been mentioned in 2 posts and received 2 likes.

alphaXiv