Pseudo-Secret Random Qubit Generator (PSQRG): Difference between revisions

Line 12: Line 12:
  Figure
  Figure


== Notations ==
*Notations
*fk, function for target register
**<math>f_k</math>, function for target register
*tk, trapdoor for function fk
**<math>t_k</math>, trapdoor for function <math>f_k</math>
*Ufk, Unitary operated on the target register taking first register as control, used to compute output of the function in the target register.
**<math>U_{f_k}</math>, Unitary operated on the target register taking first register as control, used to compute output of the function in the target register
*y, measurement outcome of the target register
**y, measurement outcome of the target register
*x, x’, pre-image pair for a given measurement outcome y.
**<math>x, x’</math>, pre-image pair for a given measurement outcome y
*xi value of qubit i for pre-image x
**<math>x_i</math> value of qubit i for pre-image x
*x’i value of qubit i for pre-image x’
**<math>x’_i</math> value of qubit i for pre-image x’
*αi, Client’s measurement angles for qubit i in the control register
**<math>α_i</math>, Client’s measurement angles for qubit i in the control register
*bi, Server’s measurement outcome for qubit i in the control register
**<math>b_i</math>, Server’s measurement outcome for qubit i in the control register
*θ, classical descriptin of the hidden input state
**<math>\theta</math>, classical description of the hidden input state
 
==Definitions (informal)==
==Definitions (informal)==
*''Quantum-Safe'' A protocol/function is quantum-safe (also known as post-quantum secure), if all its properties remain valid when the adversaries are quantum polynomial-time (QPT).
*''Quantum-Safe'' A protocol/function is quantum-safe (also known as post-quantum secure), if all its properties remain valid when the adversaries are quantum polynomial-time (QPT).
Write, autoreview, editor, reviewer
3,129

edits