Cryptanalysis of three quantum money schemes

نویسندگان

چکیده

We investigate the security assumptions behind three public-key quantum money schemes. Aaronson and Christiano proposed a scheme based on hidden subspaces of vector space $$\mathbb {F}_2^n$$ in 2012. It was conjectured by Pena et al. (IACR international workshop cryptography, pp 194–213. Springer, 2015) that hard problem underlying can be solved quasi-polynomial time. confirm this conjecture, hence prove is insecure, giving polynomial time algorithm for problem. Our computing Zariski tangent random point subspace. Zhandry (Quantum lightning never strikes same state twice 11, 2017. https://eprint.iacr.org/2017/1080/20171110:155027 ) multivariate hash functions. Zhandry’s insecure cloning with high probability. uses verification circuit to produce banknote from given serial number. Kane quaternion algebras, 2021. arXiv:2109.12643 algebras. The their represents an eigenvector set Hecke operators. give reduction linear algebra Although our does not break scheme, latter much easier understand, we hope opens new avenues future cryptanalyses scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum Cryptanalysis on Some Generalized Feistel Schemes

Post-quantum cryptography has attracted much attention from worldwide cryptologists. In ISIT 2010, Kuwakado and Morii gave a quantum distinguisher with polynomial time against 3-round Feistel networks. However, generalized Feistel schemes (GFS) have not been systematically investigated against quantum attacks. In this paper, we study the quantum distinguishers about some generalized Feistel sch...

متن کامل

Cryptanalysis of \2R" Schemes

The function decomposition problem can be stated as: Given the algebraic expression of the composition of two mappings, how can we identify the two factors? This problem is believed to be in general intractable [1]. Based on this belief, J. Patarin and L. Goubin designed a new family of candidates for public key cryptography, the so called \2R schemes" [10, 11]. The public key of a \2R"-scheme ...

متن کامل

Cryptanalysis of 2R- Schemes

In this paper, we study the security of 2R− schemes [17, 18], which are the “minus variant” of two-round schemes. This variant consists in removing some of the n polynomials of the public key, and permits to thwart an attack described at Crypto’99 [25] against two-round schemes. Usually, the “minus variant” leads to a real strengthening of the considered schemes. We show here that this is actua...

متن کامل

Cryptanalysis of Threshold-Multisignature schemes

In [1], Li et al. proposed a new type of signature scheme, called the (t, n) thresholdmutisignature scheme. The first one needs a mutually trusted share distribution center (SDC) while the second one does not. In this paper, we present a security analysis on their second schemes. We point out that their second threshold-multisignature scheme is vulnerable to universal forgery by an insider atta...

متن کامل

Cryptanalysis of matrix conjugation schemes

In this paper we cryptanalyze two protocols: GrigorievShpilrain authentication protocol and Wang et al. public key encryption protocols that use computational hardness of some variations of the conjugacy search problem in noncommutative monoids. We devise a practical heuristic algorithm solving those problems. As a conclusion we claim that these protocols are insecure for the proposed parameter...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Quantum Information Processing

سال: 2023

ISSN: ['1573-1332', '1570-0755']

DOI: https://doi.org/10.1007/s11128-023-03919-0