Fully Simulatable Quantum-Secure Coin-Flipping and Applications
We propose a coin-flip protocol which yields a string of strong, random coins and is fully simulatable against poly-sized quantum adversaries on both sides. It can be implemented with quantum-computational security without any set-up assumptions, since our construction only assumes mixed commitment schemes which we show how to construct in the given setting. We then show that the interactive generation of random coins at the beginning or during outer protocols allows for quantum-secure realizations of classical schemes, again without any set-up assumptions. As example applications we discuss quantum zero-knowledge proofs of knowledge and quantum-secure two-party function evaluation. Both applications assume only fully simulatable coin-flipping and mixed commitments. Since our framework allows to construct fully simulatable coin-flipping from mixed commitments, this in particular shows that mixed commitments are complete for quantum-secure two-party function evaluation. This seems to be the first completeness result for quantum-secure two-party function evaluation from a generic assumption.
Unable to display preview. Download preview PDF.
- 2.Blum, M.: Coin flipping by telephone. In: Advances in Cryptology: A Report on CRYPTO 1981, pp. 11–15. U.C. Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04 (1981)Google Scholar
- 10.Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems (extended abstract). In: 17th Annual ACM Symposium on Theory of Computing (STOC), pp. 291–304 (1985)Google Scholar
- 11.van de Graaf, J.: Towards a formal definition of security for quantum protocols. PhD thesis, Université de Montréal (Canada) (1997)Google Scholar
- 12.Hallgren, S., Smith, A., Song, F.: Classical cryptographic protocols in a quantum world (2011), Extended abstract available at qip2011.quantumlah.org/scientificprogramme/abstract/183.pdf
- 13.Kilian, J.: Founding cryptography on oblivious transfer. In: 20th Annual ACM Symposium on Theory of Computing (STOC), pp. 20–31 (1988)Google Scholar
- 14.Lunemann, C.: Cryptographic Protocols under Quantum Attacks. PhD thesis, Aarhus University (Denmark) (November 2010), arXiv:1102.0885 [quant-ph]Google Scholar
- 15.Lunemann, C., Nielsen, J.B.: Fully simulatable quantum-secure coin-flipping and applications (2011), Full version available at eprint.iacr.org/2011/065
- 16.Peikert, C., Vaikuntanathan, V., Waters, B.: A framework for efficient and composable oblivious transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554–571. Springer, Heidelberg (2008), Full version available at eprint.iacr.org/2007/348.pdf
- 17.Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: 37th Annual ACM Symposium on Theory of Computing (STOC), pp. 84–93 (2005)Google Scholar
- 18.Smith, A.: Personal communication (2009)Google Scholar
- 19.Watrous, J.: Zero-knowledge against quantum attacks. SIAM Journal on Computing 39(1), 25–58 (2009); Preliminary version in 38th Annual ACM Symposium on Theory of Computing (STOC), pp. 296–305 (2006)Google Scholar