DualRing: Generic Construction of Ring Signatures with Efficient Instantiations

TH Yuen, MF Esgin, JK Liu, MH Au, Z Ding - Annual International …, 2021 - Springer
We introduce a novel generic ring signature construction, called DualRing, which can be
built from several canonical identification schemes (such as Schnorr identification) …

Secure software leasing

P Ananth, RL La Placa - Annual International Conference on the Theory …, 2021 - Springer
Formulating cryptographic definitions to protect against software piracy is an important
research direction that has not received much attention. Since natural definitions using …

Quantum homomorphic encryption for polynomial-sized circuits

Y Dulek, C Schaffner, F Speelman - … , Santa Barbara, CA, USA, August 14 …, 2016 - Springer
We present a new scheme for quantum homomorphic encryption which is compact and
allows for efficient evaluation of arbitrary polynomial-sized quantum circuits. Building on the …

Quantum copy-protection of compute-and-compare programs in the quantum random oracle model

A Coladangelo, C Majenz, A Poremba - Quantum, 2024 - quantum-journal.org
Copy-protection allows a software distributor to encode a program in such a way that it can
be evaluated on any input, yet it cannot be" pirated"–a notion that is impossible to achieve in …

[PDF][PDF] How to use quantum indistinguishability obfuscation

A Coladangelo, S Gunn - Proceedings of the 56th Annual ACM …, 2024 - dl.acm.org
Quantum copy protection, introduced by Aaronson, enables giving out a quantum program-
description that cannot be meaningfully duplicated. Despite over a decade of study, copy …

Unclonable decryption keys

M Georgiou, M Zhandry - Cryptology ePrint Archive, 2020 - eprint.iacr.org
We initiate the study of encryption schemes where the decryption keys are unclonable
quantum objects, which we call single decryptor encryption. We give a number of initial …

On the round complexity of secure quantum computation

J Bartusek, A Coladangelo, D Khurana… - Advances in Cryptology …, 2021 - Springer
We construct the first constant-round protocols for secure quantum computation in the two-
party (2PQC) and multi-party (MPQC) settings with security against malicious adversaries …

Quantum garbled circuits

Z Brakerski, H Yuen - Proceedings of the 54th Annual ACM SIGACT …, 2022 - dl.acm.org
In classical computing, garbled circuits (and their generalization known as randomized
encodings) are a versatile cryptographic tool with many applications such as secure …

Quantum State Obfuscation from Classical Oracles

J Bartusek, Z Brakerski, V Vaikuntanathan - Proceedings of the 56th …, 2024 - dl.acm.org
A major unresolved question in quantum cryptography is whether it is possible to obfuscate
arbitrary quantum computation. Indeed, there is much yet to understand about the feasibility …

Impossibility of quantum virtual black-box obfuscation of classical circuits

G Alagic, Z Brakerski, Y Dulek, C Schaffner - Advances in Cryptology …, 2021 - Springer
Virtual black-box obfuscation is a strong cryptographic primitive: it encrypts a circuit while
maintaining its full input/output functionality. A remarkable result by Barak et al.(Crypto 2001) …