CryptoDB
Louis Salvail
Publications and invited talks
Year
Venue
Title
2025
ASIACRYPT
Signatures From Pseudorandom States via bot-PRFs
Abstract
Different flavors of quantum pseudorandomness have proven useful for various cryptographic applications, with the compelling feature that these primitives are potentially weaker than post-quantum one-way functions. Notably, Ananth, Lin, and Yuen (2023) have shown that logarithmic pseudorandom states can be used to construct a pseudo-deterministic $\PRG$: informally, for a fixed seed, the output is the same with $1-1/poly$ probability.
In this work, we introduce new definitions for $\botPRG$ and $\botPRF$. The correctness guarantees are that, for a fixed seed, except with negligible probability, the output is either the same (with probability $1-1/poly$) or recognizable abort, denoted $\bot$. Our approach admits a natural definition of multi-time $\PRG$ security, as well as the adaptive security of a $\PRF$. We construct a $\botPRG$ from any pseudo-deterministic $\PRG$ and, from that, a $\botPRF$.
While many Minicrypt primitives--such as symmetric encryption, commitments, MACs, and length-restricted one-time digital signatures--have been realized from quantum pseudorandomness assumptions, constructing full digital signatures remained an open challenge, and was explicitly posed as an open question by Morimae and Yamakawa (Crypto 2022). We resolve this by presenting the first (quantum) digital signature scheme with classical public keys and signatures from logarithmic pseudorandom states, utilizing our construction of $\botPRF$s. Additionally, we construct CPA secure public-key encryption with tamper-resilient quantum public keys. Combined with a recent work of Barhoush, Nishimaki, and Yamakawa (2025), our results demonstrate that these applications can be realized under assumptions that are separated from quantum evaluatable one-way functions.
2019
JOFC
Key Establishment à la Merkle in a Quantum World
Abstract
In 1974, Ralph Merkle proposed the first unclassified protocol for secure communications over insecure channels. When legitimate communicating parties are willing to spend an amount of computational effort proportional to some parameter N , an eavesdropper cannot break into their communication without spending a time proportional to $$N^2$$ N 2 , which is quadratically more than the legitimate effort. In a quantum world, however, Merkle’s protocol is immediately broken by Grover’s algorithm, but it is easily repaired if we are satisfied with a quantum protocol against which a quantum adversary needs to spend a time proportional to $$N^{3/2}$$ N 3 / 2 in order to break it. Can we do better? We give two new key establishment protocols in the spirit of Merkle’s. The first one, which requires the legitimate parties to have access to a quantum computer, resists any quantum adversary who is not willing to make an effort at least proportional to $$N^{5/3}$$ N 5 / 3 , except with vanishing probability. Our second protocol is purely classical, yet it requires any quantum adversary to work asymptotically harder than the legitimate parties, again except with vanishing probability. In either case, security is proved for a typical run of the protocols: the probabilities are taken over the random (or quantum) choices made by the legitimate participants in order to establish their key as well as over the random (or quantum) choices made by the adversary who is trying to be privy to it.
2018
TCC
Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation
Abstract
We investigate sampling procedures that certify that an arbitrary quantum state on n subsystems is close to an ideal mixed state $$\varphi ^{\otimes n}$$ for a given reference state $$\varphi $$, up to errors on a few positions. This task makes no sense classically: it would correspond to certifying that a given bitstring was generated according to some desired probability distribution. However, in the quantum case, this is possible if one has access to a prover who can supply a purification of the mixed state.In this work, we introduce the concept of mixed-state certification, and we show that a natural sampling protocol offers secure certification in the presence of a possibly dishonest prover: if the verifier accepts then he can be almost certain that the state in question has been correctly prepared, up to a small number of errors.We then apply this result to two-party quantum coin-tossing. Given that strong coin tossing is impossible, it is natural to ask “how close can we get”. This question has been well studied and is nowadays well understood from the perspective of the bias of individual coin tosses. We approach and answer this question from a different—and somewhat orthogonal—perspective, where we do not look at individual coin tosses but at the global entropy instead. We show how two distrusting parties can produce a common high-entropy source, where the entropy is an arbitrarily small fraction below the maximum.
2017
EUROCRYPT
2004
EUROCRYPT
1999
EUROCRYPT
Service
- Eurocrypt 2021 Program committee
- Eurocrypt 2018 Program committee
- Eurocrypt 2017 Program committee
- Crypto 2005 Program committee
- Eurocrypt 2005 Program committee
- TCC 2005 Program committee
- Eurocrypt 2001 Program committee
Coauthors
- Mohammed Barhoush (1)
- Amit Behera (1)
- Charles H. Bennett (2)
- François Bessette (2)
- Gilles Brassard (5)
- Claude Crépeau (4)
- Ivan Damgård (9)
- Paul Dumais (2)
- Frédéric Dupuis (4)
- Serge Fehr (9)
- Peter Høyer (2)
- Kassem Kalach (2)
- Marc Kaplan (2)
- Joe Kilian (1)
- Frédéric Légaré (1)
- Philippe Lamontagne (2)
- Sophie Laplante (2)
- Carolin Lunemann (1)
- Dominic Mayers (2)
- Kirill Morozov (1)
- Jesper Buus Nielsen (2)
- Lior Ozer (1)
- Thomas Brochmann Pedersen (2)
- Renato Renner (1)
- Louis Salvail (27)
- Or Sattath (1)
- Christian Schaffner (5)
- Jean-Raymond Simard (1)
- John A. Smolin (2)
- Miroslava Sotáková (1)
- Alain Tapp (1)