CryptoDB
Amit Behera
Publications
Year
Venue
Title
2025
EUROCRYPT
A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID
Abstract
While in classical cryptography one-way functions (OWFs) are
widely regarded as the “minimal assumption”, the situation in quantum
cryptography is less clear. Recent works have put forward two concurrent
candidates for the minimal assumption in quantum cryptography: One-
way state generators (OWSGs), postulating the existence of a hard
search problem with an efficient verification algorithm, and EFI pairs,
postulating the existence of a hard distinguishing problem. Two recent
papers [Khurana and Tomer STOC’24; Batra and Jain FOCS’24] showed
that OWSGs imply EFI pairs, but the reverse direction remained open.
In this work, we give strong evidence that the opposite direction does
not hold: We show that there is a quantum unitary oracle relative to
which EFI pairs exist but OWSGs do not. In fact, we show a slightly
stronger statement that holds also for EFI pairs that output classical bits
(QEFID).
As a consequence, we separate, via our oracle, QEFID and one-way
puzzles from OWSGs and several other Microcrypt primitives, including
efficiently verifiable one-way puzzles and unclonable state generators. In
particular, this solves a problem left open in [Chung, Goldin, and Gray
Crypto’24].
Using similar techniques, we also establish a fully black-box separation
(which is slightly weaker than an oracle separation) between private-key
quantum money schemes and QEFID pairs.
One conceptual implication of our work is that the existence of an efficient
verification algorithm may lead to qualitatively stronger primitives in
quantum cryptography.
2024
CRYPTO
A Modular Approach to Unclonable Cryptography
Abstract
We explore a new pathway to designing unclonable cryptographic primitives. We propose a new notion called unclonable puncturable obfuscation (UPO) and study its implications for unclonable cryptography. Using UPO, we present modular (and in some cases, arguably, simple) constructions of many primitives in unclonable cryptography, including, public-key quantum money, quantum copy-protection for many classes of functionalities, unclonable encryption, and single-decryption encryption.
Notably, we obtain the following new results assuming the existence of UPO:
1. We show that any cryptographic functionality can be copy-protected as long as this functionality satisfies a notion of security, which we term puncturable security. Prior feasibility results focused on copy-protecting specific cryptographic functionalities.
2. We show that copy-protection exists for any class of evasive functions as long as the associated distribution satisfies a preimage-sampleability condition. Prior works demonstrated copy-protection for point functions, which follows as a special case of our result.
We put forward a candidate construction of UPO and prove two notions of security, each based on the existence of (post-quantum) sub-exponentially secure indistinguishability obfuscation and one-way functions, the quantum hardness of learning with errors, and a new conjecture called simultaneous inner product conjecture.
2023
TCC
Pseudorandomness with Proof of Destruction and Applications
Abstract
Two fundamental properties of quantum states that quantum information theory explores are pseudorandomness and provability of destruction. We introduce the notion of quantum pseudorandom states with proofs of destruction (PRSPD) that combines both these properties. Like standard pseudorandom states (PRS), these are efficiently generated quantum states that are indistinguishable from random, but they can also be measured to create a classical string. This string is verifiable (given the secret key) and certifies that the state has been destructed. We show that, similarly to PRS, PRSPD can be constructed from any post-quantum one-way function. As far as the authors are aware, this is the first construction of a family of states that satisfies both pseudorandomness and provability of destruction.
We show that many cryptographic applications that were shown based on PRS variants using quantum communication can be based on (variants of) PRSPD using only classical communication. This includes symmetric encryption, message authentication, one-time signatures, commitments, and classically verifiable private quantum coins.
Coauthors
- Prabhanjan Ananth (1)
- Amit Behera (3)
- Zvika Brakerski (1)
- Giulio Malavolta (1)
- Tomoyuki Morimae (1)
- Tamer Mour (1)
- Or Sattath (1)
- Omri Shmueli (1)
- Takashi Yamakawa (1)