Quantum Learning Algorithms and Post-Quantum Cryptography

12/26/2017
by   Alexander Poremba, et al.
0

Quantum algorithms have demonstrated promising speed-ups over classical algorithms in the context of computational learning theory - despite the presence of noise. In this work, we give an overview of recent quantum speed-ups, revisit the Bernstein-Vazirani algorithm in a new learning problem extension over an arbitrary cyclic group and discuss recent applications in cryptography, such as the Learning with Errors problem. We turn to post-quantum cryptography and investigate attacks in which an adversary is given quantum access to a classical encryption scheme. In particular, we consider new notions of security under non-adaptive quantum chosen-ciphertext attacks and propose symmetric-key encryption schemes based on quantum-secure pseudorandom functions that fulfil our definitions. In order to prove security, we introduce a novel relabeling game and show that, in an oracle model, no quantum algorithm making superposition queries can reliably distinguish between the class of functions that are randomly relabeled at a small subset of the domain. Finally, we discuss current progress in quantum computing technology, particularly with regard to the ion-trap architecture, as well as the implementation of quantum algorithms. Moreover, we shed light on the relevance and effectiveness of common noise models adopted in computational learning theory.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/29/2018

On non-adaptive quantum chosen-ciphertext attacks and Learning with Errors

Large-scale quantum computing is a significant threat to classical publi...
research
08/09/2019

Composable and Finite Computational Security of Quantum Message Transmission

Recent research in quantum cryptography has led to the development of sc...
research
06/11/2019

General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography

Starting from the one-way group action framework of Brassard and Yung (C...
research
04/17/2022

PiouCrypt: Decentralized Lattice-based Method for Visual Symmetric Cryptography

In recent years, establishing secure visual communications has turned in...
research
07/07/2023

A Cryptography Inspired Model for Non-local Correlations: Decrypting the Enigmas

We propose a cryptography-inspired model for nonlocal correlations. Foll...
research
01/09/2022

Locality-Preserving Hashing for Shifts with Connections to Cryptography

Can we sense our location in an unfamiliar environment by taking a subli...
research
12/02/2021

Relativistic zero-knowledge protocol for NP over the internet unconditionally secure against quantum adversaries

Relativistic cryptography is a proposal for achieving unconditional secu...

Please sign up or login with your details

Forgot password? Click here to reset