Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications

被引:4
|
作者
Dupuis, Frederic [2 ]
Fehr, Serge [1 ]
Lamontagne, Philippe [3 ]
Salvail, Louis [3 ]
机构
[1] CWI, Amsterdam, Netherlands
[2] Masaryk Univ, Fac Informat, Brno, Czech Republic
[3] Univ Montreal DIRO, Montreal, PQ, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
OBLIVIOUS TRANSFER; CRYPTOGRAPHY;
D O I
10.1007/978-3-662-53015-3_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We prove a general relation between adaptive and non adaptive strategies in the quantum setting, i.e., between strategies where the adversary can or cannot adaptively base its action on some auxiliary quantum side information. Our relation holds in a very general setting, and is applicable as long as we can control the bit-size of the side information, or, more generally, its "information content". Since adaptivity is notoriously difficult to handle in the analysis of (quantum) cryptographic protocols, this gives us a very powerful tool: as long as we have enough control over the side information, it is sufficient to restrict ourselves to non-adaptive attacks. We demonstrate the usefulness of this methodology with two examples. The first is a quantum bit commitment scheme based on 1-bit cut-and-choose. Since bit commitment implies oblivious transfer (in the quantum setting), and oblivious transfer is universal for two-party computation, this implies the universality of 1-bit cut-and-choose, and thus solves the main open problem of [9]. The second example is a quantum bit commitment scheme proposed in 1993 by Brassard et al. It was originally suggested as an unconditionally secure scheme, back when this was thought to be possible. We partly restore the scheme by proving it secure in (a variant of) the bounded quantum storage model. In both examples, the fact that the adversary holds quantum side information obstructs a direct analysis of the scheme, and we circumvent it by analyzing a non-adaptive version, which can be done by means of known techniques, and applying our main result.
引用
下载
收藏
页码:33 / 59
页数:27
相关论文
共 50 条
  • [1] Asymptotic Separation Between Adaptive and Non-adaptive Strategies in Quantum Channel Discrimination
    Salek, Farzin
    Hayashi, Masahito
    Winter, Andreas
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 1194 - 1199
  • [2] Self-selection of evolutionary strategies: adaptive versus non-adaptive forces
    Putnins, Matthew
    Androulakis, Ioannis P.
    HELIYON, 2021, 7 (05)
  • [3] Adaptive versus non-adaptive helping in cooperative breeders
    Wright, J
    BEHAVIORAL ECOLOGY AND SOCIOBIOLOGY, 1999, 46 (06) : 437 - 438
  • [4] Adaptive versus non-adaptive helping in cooperative breeders
    J. Wright
    Behavioral Ecology and Sociobiology, 1999, 46 : 437 - 438
  • [5] Adaptive Greedy versus Non-Adaptive Greedy for Influence Maximization
    Chen W.
    Peng B.
    Schoenebeck G.
    Tao B.
    Journal of Artificial Intelligence Research, 2022, 74 : 303 - 351
  • [6] Adaptive Greedy versus Non-Adaptive Greedy for Influence Maximization
    Chen, Wei
    Peng, Binghui
    Schoenebeck, Grant
    Tao, Biaoshuai
    JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 2022, 74 : 303 - 351
  • [7] Adaptive Greedy versus Non-Adaptive Greedy for Influence Maximization
    Chen, Wei
    Peng, Binghui
    Schoenebeck, Grant
    Tao, Biaoshuai
    THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 590 - 597
  • [8] Fair bandwidth allocation for the integration of adaptive and non-adaptive applications
    Salles, RM
    Barria, JA
    SERVICE ASSURANCE WITH PARTIAL AND INTERMITTENT RESOURCES, PROCEEDINGS, 2004, 3126 : 1 - 12
  • [9] Adaptive vs. non-adaptive strategies for the computation of optical flow
    Condell, J. V.
    Scotney, B. W.
    Morrow, P. J.
    INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2006, 16 (02) : 35 - 50
  • [10] Adaptive versus Non-Adaptive Security of Multi-Party Protocols
    Ran Canetti
    Ivan Damgard
    Stefan Dziembowski
    Yuval Ishai
    Tal Malkin
    Journal of Cryptology, 2004, 17 : 153 - 207