6
4

Powerful Primitives in the Bounded Quantum Storage Model

Abstract

The bounded quantum storage model aims to achieve security against computationally unbounded adversaries that are restricted only with respect to their quantum memories. In this work, we provide information-theoretic secure constructions in this model for the following powerful primitives: (1) CCA1-secure symmetric key encryption, message authentication codes, and one-time programs. These schemes require no quantum memory for the honest user, while they can be made secure against adversaries with arbitrarily large memories by increasing the transmission length sufficiently. (2) CCA1-secure asymmetric key encryption, encryption tokens, signatures, signature tokens, and program broadcast. These schemes are secure against adversaries with roughly eme^{\sqrt{m}} quantum memory where mm is the quantum memory required for the honest user. All of the constructions additionally satisfy disappearing security, essentially preventing an adversary from storing and using a transmission later on.

View on arXiv
@article{barhoush2025_2302.05724,
  title={ Powerful Primitives in the Bounded Quantum Storage Model },
  author={ Mohammed Barhoush and Louis Salvail },
  journal={arXiv preprint arXiv:2302.05724},
  year={ 2025 }
}
Comments on this paper