Quantum Amnesia Leaves Cryptographic Mementos: A Note On Quantum Skepticism

12/16/2022
by   Or Sattath, et al.
0

Leonard Shelby, the protagonist of Memento, uses mementos in the form of tattoos and pictures to handle his amnesia. Similar to Leonard, contemporary quantum computers suffer from "quantum amnesia": the inability to store quantum registers for a long duration. Quantum computers can only retain classical "mementos" of quantum registers by measuring them before those vanish. Some quantum skeptics argue that this quantum amnesia is inherent. We point out that this variant of a skeptic world is roughly described by the quantum bounded storage model, and although it is a computational obstacle that annuls potential quantum computational advantage, the seemingly undesired properties provide a cryptographic advantage. Namely, providing exotic primitives promised by the quantum bounded storage model, such as unconditionally secure commitment and oblivious transfer schemes, with constructions involving nothing but transmission and measurement of BB84 states.

READ FULL TEXT
research
02/11/2023

Powerful Primitives in the Bounded Quantum Storage Model

The bounded quantum storage model aims to achieve security against compu...
research
03/09/2019

Post-Quantum Cryptographic Hardware Primitives

The development and implementation of post-quantum cryptosystems have be...
research
07/24/2019

Quantum Advantage and Y2K Bug: Comparison

Quantum Computers (QCs), once they mature, will be able to solve some pr...
research
07/03/2019

Cryptographic One-way Function Based on Boson Sampling

The quest for practical cryptographic primitives that are robust against...
research
02/11/1998

Analogue Quantum Computers for Data Analysis

Analogue computers use continuous properties of physical system for mode...
research
05/25/2022

Quantum security and theory of decoherence

We sketch a relation between two crucial, yet independent, fields in qua...
research
03/27/2023

Performanz Evaluation von PQC in TLS 1.3 unter variierenden Netzwerkcharakteristiken

Quantum computers could break currently used asymmetric cryptographic sc...

Please sign up or login with your details

Forgot password? Click here to reset