Quantum cryptography beyond quantum key distribution

A Broadbent, C Schaffner - Designs, Codes and Cryptography, 2016 - Springer
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …

Interactive oracle proofs

E Ben-Sasson, A Chiesa, N Spooner - … 2016-B, Beijing, China, October 31 …, 2016 - Springer
We initiate the study of a proof system model that naturally combines interactive proofs (IPs)
and probabilistically-checkable proofs (PCPs), and generalizes interactive PCPs (which …

Fully device independent quantum key distribution

U Vazirani, T Vidick - Communications of the ACM, 2019 - dl.acm.org
Quantum cryptography promises levels of security that are impossible to attain in a classical
world. Can this security be guaranteed to classical users of a quantum protocol, who may …

SNARGs for from LWE

AR Choudhuri, A Jain, Z Jin - 2021 IEEE 62nd Annual …, 2022 - ieeexplore.ieee.org
We provide the first construction of a succinct non-interactive argument (SNARG) for all
polynomial time deterministic computations based on standard assumptions. For T steps of …

Delegating computation: interactive proofs for muggles

S Goldwasser, YT Kalai, GN Rothblum - Journal of the ACM (JACM), 2015 - dl.acm.org
In this work we study interactive proofs for tractable languages. The (honest) prover should
be efficient and run in polynomial time or, in other words, a “muggle”. 1 The verifier should …

Leveled fully homomorphic signatures from standard lattices

S Gorbunov, V Vaikuntanathan, D Wichs - Proceedings of the forty …, 2015 - dl.acm.org
In a homomorphic signature scheme, a user Alice signs some large dataset x using her
secret signing key and uploads the signed data to an untrusted remote server. The server …

Single-server private information retrieval with sublinear amortized time

H Corrigan-Gibbs, A Henzinger, D Kogan - … International Conference on …, 2022 - Springer
We construct new private-information-retrieval protocols in the single-server setting. Our
schemes allow a client to privately fetch a sequence of database records from a server …

Batch Arguments for  and More from Standard Bilinear Group Assumptions

B Waters, DJ Wu - Annual International Cryptology Conference, 2022 - Springer
Non-interactive batch arguments for NP provide a way to amortize the cost of NP verification
across multiple instances. They enable a prover to convince a verifier of multiple NP …

Boosting batch arguments and RAM delegation

Y Kalai, A Lombardi, V Vaikuntanathan… - Proceedings of the 55th …, 2023 - dl.acm.org
We show how to generically improve the succinctness of non-interactive publicly verifiable
batch argument (BARG) systems. In particular, we show (under a mild additional …

Constant-round interactive proofs for delegating computation

O Reingold, GN Rothblum, RD Rothblum - Proceedings of the forty …, 2016 - dl.acm.org
The celebrated IP= PSPACE Theorem of Lund et-al.(J. ACM 1992) and Shamir (J. ACM
1992), allows an all-powerful but untrusted prover to convince a polynomial-time verifier of …