2021
DOI: 10.48550/arxiv.2111.12257
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Post-Quantum Zero Knowledge, Revisited (or: How to Do Quantum Rewinding Undetectably)

Abstract: A major difficulty in quantum rewinding is the fact that measurement is destructive: extracting information from a quantum state irreversibly changes it. This is especially problematic in the context of zero-knowledge simulation, where preserving the adversary's state is essential.In this work, we develop new techniques for quantum rewinding in the context of extraction and zero-knowledge simulation:1. We show how to extract information from a quantum adversary by rewinding it without disturbing its internal s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…(3) Finally, QSP/QSVT have recently been applied to a wide variety of subfields, both in and out of quantum information. These include Hamiltonian simulation [3], phase estimation [2], quantum zero-knowledge proofs [10], classical quantum-inspired machine learning algorithms [9], semi-definite programming [25], quantum adiabatic methods [26], the approximation of correlation functions [27], the approximation of fidelity [6], recovery maps [7], and fast inversion of linear systems [28]. Efforts continue to bring further computational problems into the fold of QSP/QSVT.…”
Section: A Prior Workmentioning
confidence: 99%
See 1 more Smart Citation
“…(3) Finally, QSP/QSVT have recently been applied to a wide variety of subfields, both in and out of quantum information. These include Hamiltonian simulation [3], phase estimation [2], quantum zero-knowledge proofs [10], classical quantum-inspired machine learning algorithms [9], semi-definite programming [25], quantum adiabatic methods [26], the approximation of correlation functions [27], the approximation of fidelity [6], recovery maps [7], and fast inversion of linear systems [28]. Efforts continue to bring further computational problems into the fold of QSP/QSVT.…”
Section: A Prior Workmentioning
confidence: 99%
“…This includes Hamiltonian simulation [3,5], search [1], phase estimation [2], quantum walks [1], fidelity estimation [6], sophisticated techniques for measurement [7], and channel discrimination [8]. QSVT has found purchase in surprisingly disparate subfields, from undergirding a general theory of quantuminspired classical algorithms for low-rank machine learning [9], to quantum cryptographic protocols with zero-knowledge properties [10].…”
Section: Introductionmentioning
confidence: 99%
“…(3) Finally, QSP/QSVT have recently been applied to a wide variety of subfields, both in and out of quantum information. These include Hamiltonian simulation [3], phase estimation [2], quantum zero-knowledge proofs [10], classical quantum-inspired machine learning algorithms [9], semi-definite programming [25], quantum adiabatic methods [26], the approximation of correlation functions [27], the approximation of fidelity [6], recovery maps [7], and fast inversion of linear systems [28]. Efforts continue to bring further computational problems into the fold of QSP/QSVT.…”
Section: Prior Workmentioning
confidence: 99%
“…This includes Hamiltonian simulation [5,3], search [1], phase estimation [2], quantum walks [1], fidelity estimation [6], sophisticated techniques for measurement [7], and channel discrimination [8]. QSVT has found purchase in surprisingly disparate subfields, from undergirding a general theory of quantum-inspired classical algorithms for low-rank machine learning [9], to quantum cryptographic protocols with zero-knowledge properties [10].…”
Section: Introductionmentioning
confidence: 99%
“…In [Wat09], the reason for this is the fact that the space complexity of the simulator depends on the communication complexity of the protocol which in turn is some function of the security parameter. In [CCY21,CCLY21b,LMS21], the simulator runs the verifier coherently multiple times and thus, the space complexity additionally depends on the number of iterations.…”
Section: Introductionmentioning
confidence: 99%