Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round

11/16/2021
by   Nai-Hui Chia, et al.
0

From the minimal assumption of post-quantum semi-honest oblivious transfers, we build the first ϵ-simulatable two-party computation (2PC) against quantum polynomial-time (QPT) adversaries that is both constant-round and black-box (for both the construction and security reduction). A recent work by Chia, Chung, Liu, and Yamakawa (FOCS'21) shows that post-quantum 2PC with standard simulation-based security is impossible in constant rounds, unless either 𝐍𝐏⊆𝐁𝐐𝐏 or relying on non-black-box simulation. The ϵ-simulatability we target is a relaxation of the standard simulation-based security that allows for an arbitrarily small noticeable simulation error ϵ. Moreover, when quantum communication is allowed, we can further weaken the assumption to post-quantum secure one-way functions (PQ-OWFs), while maintaining the constant-round and black-box property. Our techniques also yield the following set of constant-round and black-box two-party protocols secure against QPT adversaries, only assuming black-box access to PQ-OWFs: - extractable commitments for which the extractor is also an ϵ-simulator; - ϵ-zero-knowledge commit-and-prove whose commit stage is extractable with ϵ-simulation; - ϵ-simulatable coin-flipping; - ϵ-zero-knowledge arguments of knowledge for 𝐍𝐏 for which the knowledge extractor is also an ϵ-simulator; - ϵ-zero-knowledge arguments for 𝐐𝐌𝐀. At the heart of the above results is a black-box extraction lemma showing how to efficiently extract secrets from QPT adversaries while disturbing their quantum state in a controllable manner, i.e., achieving ϵ-simulatability of the after-extraction state of the adversary.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset
Success!
Error Icon An error occurred

Sign in with Google

×

Use your Google Account to sign in to DeepAI

×

Consider DeepAI Pro