Zum Hauptinhalt springen

Showing 1–9 of 9 results for author: Boddu, N G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.07340  [pdf, ps, other

    cs.CR

    Quantum secure non-malleable randomness encoder and its applications

    Authors: Rishabh Batra, Naresh Goud Boddu, Rahul Jain

    Abstract: "Non-Malleable Randomness Encoder"(NMRE) was introduced by Kanukurthi, Obbattu, and Sekar~[KOS18] as a useful cryptographic primitive helpful in the construction of non-malleable codes. To the best of our knowledge, their construction is not known to be quantum secure. We provide a construction of a first rate-$1/2$, $2$-split, quantum secure NMRE and use this in a black-box manner, to construct… ▽ More

    Submitted 12 August, 2023; originally announced August 2023.

    Comments: arXiv admin note: text overlap with arXiv:2308.06466

  2. arXiv:2308.06466  [pdf, ps, other

    cs.CR quant-ph

    Split-State Non-Malleable Codes and Secret Sharing Schemes for Quantum Messages

    Authors: Naresh Goud Boddu, Vipul Goyal, Rahul Jain, João Ribeiro

    Abstract: Non-malleable codes are fundamental objects at the intersection of cryptography and coding theory. These codes provide security guarantees even in settings where error correction and detection are impossible, and have found applications to several other cryptographic tasks. One of the strongest and most well-studied adversarial tampering models is $2$-split-state tampering. Here, a codeword is spl… ▽ More

    Submitted 27 February, 2024; v1 submitted 12 August, 2023; originally announced August 2023.

  3. arXiv:2202.13354  [pdf, ps, other

    cs.CR quant-ph

    Quantum secure non-malleable codes in the split-state model

    Authors: Divesh Aggarwal, Naresh Goud Boddu, Rahul Jain

    Abstract: Non-malleable-codes introduced by Dziembowski, Pietrzak and Wichs [DPW18] encode a classical message $S$ in a manner such that tampering the codeword results in the decoder either outputting the original message $S$ or a message that is unrelated/independent of $S$. Providing such non-malleable security for various tampering function families has received significant attention in recent years. We… ▽ More

    Submitted 8 June, 2023; v1 submitted 27 February, 2022; originally announced February 2022.

    Comments: arXiv admin note: text overlap with arXiv:2109.03097. text overlap with arXiv:1611.09248 by other authors

  4. arXiv:2109.03097  [pdf, ps, other

    cs.CR quant-ph

    Quantum secure non-malleable-extractors

    Authors: Naresh Goud Boddu, Rahul Jain, Upendra Kapshikar

    Abstract: We construct several explicit quantum secure non-malleable-extractors. All the quantum secure non-malleable-extractors we construct are based on the constructions by Chattopadhyay, Goyal and Li [2015] and Cohen [2015]. 1) We construct the first explicit quantum secure non-malleable-extractor for (source) min-entropy $k \geq \textsf{poly}\left(\log \left( \frac{n}ε \right)\right)$ ($n$ is the len… ▽ More

    Submitted 28 May, 2023; v1 submitted 7 September, 2021; originally announced September 2021.

  5. On relating one-way classical and quantum communication complexities

    Authors: Naresh Goud Boddu, Rahul Jain, Han-Hsuan Lin

    Abstract: Communication complexity is the amount of communication needed to compute a function when the function inputs are distributed over multiple parties. In its simplest form, one-way communication complexity, Alice and Bob compute a function $f(x,y)$, where $x$ is given to Alice and $y$ is given to Bob, and only one message from Alice to Bob is allowed. A fundamental question in quantum information is… ▽ More

    Submitted 12 May, 2023; v1 submitted 24 July, 2021; originally announced July 2021.

    Journal ref: Quantum 7, 1010 (2023)

  6. arXiv:2106.02766  [pdf, ps, other

    cs.CR quant-ph

    Quantum Measurement Adversary

    Authors: Divesh Aggarwal, Naresh Goud Boddu, Rahul Jain, Maciej Obremski

    Abstract: Multi-source-extractors are functions that extract uniform randomness from multiple (weak) sources of randomness. Quantum multi-source-extractors were considered by Kasher and Kempe (for the quantum-independent-adversary and the quantum-bounded-storage-adversary), Chung, Li and Wu (for the general-entangled-adversary) and Arnon-Friedman, Portmann and Scholz (for the quantum-Markov-adversary). One… ▽ More

    Submitted 6 June, 2023; v1 submitted 4 June, 2021; originally announced June 2021.

  7. arXiv:2105.04487  [pdf, other

    cs.CR cs.IT quant-ph

    Tamper Detection against Unitary Operators

    Authors: Naresh Goud Boddu, Upendra S. Kapshikar

    Abstract: Security of a storage device against a tampering adversary has been a well-studied topic in classical cryptography. Such models give black-box access to an adversary, and the aim is to protect the stored message or abort the protocol if there is any tampering. In this work, we extend the scope of the theory of tamper detection codes against an adversary with quantum capabilities. We consider enc… ▽ More

    Submitted 6 November, 2023; v1 submitted 10 May, 2021; originally announced May 2021.

    Comments: Accepted for publication in Quantum

    Journal ref: Quantum 7, 1178 (2023)

  8. Graph-theoretic approach to dimension witnessing

    Authors: Maharshi Ray, Naresh Goud Boddu, Kishor Bharti, Leong-Chuan Kwek, Adán Cabello

    Abstract: A fundamental problem in quantum computation and quantum information is finding the minimum quantum dimension needed for a task. For tasks involving state preparation and measurements, this problem can be addressed using only the input-output correlations. This has been applied to Bell, prepare-and-measure, and Kochen-Specker contextuality scenarios. Here, we introduce a novel approach to quantum… ▽ More

    Submitted 13 November, 2020; v1 submitted 21 July, 2020; originally announced July 2020.

    Comments: 20 pages. V2 corrected minor typos and improved presentation

    Journal ref: New J. Phys. 23, 033006 (2021)

  9. Quantum Log-Approximate-Rank Conjecture is also False

    Authors: Anurag Anshu, Naresh Goud Boddu, Dave Touchette

    Abstract: In a recent breakthrough result, Chattopadhyay, Mande and Sherif [ECCC TR18-17] showed an exponential separation between the log approximate rank and randomized communication complexity of a total function $f$, hence refuting the log approximate rank conjecture of Lee and Shraibman [2009]. We provide an alternate proof of their randomized communication complexity lower bound using the information… ▽ More

    Submitted 26 November, 2018; originally announced November 2018.

    Comments: 21 pages. The same lower bound has been obtained independently and simultaneously by Makrand Sinha and Ronald de Wolf. Part of the preliminaries taken from arXiv:1611.05754

    Journal ref: 2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS)