Nov. 20, 2023, 2:10 a.m. | John Bostanci, Luowen Qian, Nicholas Spooner, Henry Yuen

cs.CR updates on arXiv.org arxiv.org

We prove a tight parallel repetition theorem for $3$-message
computationally-secure quantum interactive protocols between an efficient
challenger and an efficient adversary. We also prove under plausible
assumptions that the security of $4$-message computationally secure protocols
does not generally decrease under parallel repetition. These mirror the
classical results of Bellare, Impagliazzo, and Naor [BIN97]. Finally, we prove
that all quantum argument systems can be generically compiled to an equivalent
$3$-message argument system, mirroring the transformation for quantum proof
systems [KW00, KKMV07]. …

adversary applications message mirror protocols prove quantum repetition results security under

Red Team Penetration Tester and Operator, Junior

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)

Director, Security Operations & Risk Management

@ Live Nation Entertainment | Toronto, ON

IT and Security Specialist APAC (F/M/D)

@ Flowdesk | Singapore, Singapore, Singapore

Senior Security Controls Assessor

@ Capgemini | Washington, DC, District of Columbia, United States; McLean, Virginia, United States

GRC Systems Solution Architect

@ Deloitte | Midrand, South Africa

Cybersecurity Subject Matter Expert (SME)

@ SMS Data Products Group, Inc. | Fort Belvoir, VA, United States