Skip to main content

Non-uniformity and Quantum Advice in the Quantum Random Oracle Model

  • Conference paper
  • First Online:
Advances in Cryptology – EUROCRYPT 2023 (EUROCRYPT 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14004))

  • 1558 Accesses

Abstract

QROM (quantum random oracle model), introduced by Boneh et al. (Asiacrypt 2011), captures all generic algorithms. However, it fails to describe non-uniform quantum algorithms with preprocessing power, which receives a piece of bounded classical or quantum advice.

As non-uniform algorithms are largely believed to be the right model for attackers, starting from the work by Nayebi, Aaronson, Belovs, and Trevisan (QIC 2015), a line of works investigates non-uniform security in the random oracle model. Chung, Guo, Liu, and Qian (FOCS 2020) provide a framework and establish non-uniform security for many cryptographic applications. Although they achieve nearly optimal bounds for many applications with classical advice, their bounds for quantum advice are far from tight.

In this work, we continue the study on quantum advice in the QROM. We provide a new idea that generalizes the previous multi-instance framework, which we believe is more quantum-friendly and should be the quantum analog of multi-instance games. To this end, we match the bounds with quantum advice to those with classical advice by Chung et al., showing quantum advice is almost as good/bad as classical advice for many natural security games in the QROM.

Finally, we show that for some contrived games in the QROM, quantum advice can be exponentially better than classical advice for some parameter regimes. To our best knowledge, it provides an evidence of a general separation between quantum and classical advice relative to an unstructured oracle.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Hellman’s algorithm on functions does not behave as well as on permutations. Upper and lower bounds meet at \(ST/\alpha \) only when we consider permutations.

  2. 2.

    In [GLLZ21], they do not need quantum or classical memory \(\tau \) shared between f and \(\mathcal {A}\). However, this is essential in our proof. Nonetheless, all security proofs in the P-BR-QROM work in the stronger setting (with \(\tau \) shared between stages).

  3. 3.

    Specifically, we require \(T = 0\), i.e., no online query.

  4. 4.

    For more details, please refer to Fig 1. in [YZ22].

References

  1. Aaronson, S.: Limitations of quantum advice and one-way communication. Theory Comput. 1(1), 1–28 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  2. Aaronson, S.: Open problems related to quantum query complexity. ACM Trans. Quant. Comput. 2(4), 1–9 (2021)

    Article  MathSciNet  Google Scholar 

  3. Aaronson, S., Kuperberg, G.: Quantum versus classical proofs and advice. In: Twenty-Second Annual IEEE Conference on Computational Complexity (CCC 07), pp. 115–128. IEEE (2007)

    Google Scholar 

  4. Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 41–69. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25385-0_3

    Chapter  MATH  Google Scholar 

  5. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73 (1993)

    Google Scholar 

  6. Bar-Yossef, Z., Jayram, T.S., Kerenidis, I.: Exponential separation of quantum and classical one-way communication complexity. In: Proceedings of the Thirty-Sixth Annual ACM Symposium on Theory of Computing, pp. 128–137 (2004)

    Google Scholar 

  7. Coretti, S., Dodis, Y., Guo, S.: Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10991, pp. 693–721. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96884-1_23

    Chapter  MATH  Google Scholar 

  8. Coretti, S., Dodis, Y., Guo, S., Steinberger, J.: Random oracles and non-uniformity. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10820, pp. 227–258. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78381-9_9

    Chapter  Google Scholar 

  9. Corrigan-Gibbs, H., Kogan, D.: The function-inversion problem: barriers and opportunities. In: Hofheinz, D., Rosen, A. (eds.) TCC 2019. LNCS, vol. 11891, pp. 393–421. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36030-6_16

    Chapter  Google Scholar 

  10. Chung, K.M., Guo, S., Liu, Q., Qian, L.: Tight quantum time-space tradeoffs for function inversion. In: 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS), pp. 673–684. IEEE (2020)

    Google Scholar 

  11. Chung, K.M., Lin, H., Mahmoody, M., Pass, R.: On the power of nonuniformity in proofs of security. In: Proceedings of the 4th Conference on Innovations in Theoretical Computer Science, pp. 389–400 (2013)

    Google Scholar 

  12. Chung, K.M., Liao, T.N., Qian, L.: Lower bounds for function inversion with quantum advice. arXiv preprint arXiv:1911.09176 (2019)

  13. Dodis, Y., Guo, S., Katz, J.: Fixing cracks in the concrete: random oracles with auxiliary input, revisited. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 473–495. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56614-6_16

    Chapter  Google Scholar 

  14. De, A., Trevisan, L., Tulsiani, M.: Time space tradeoffs for attacks against one-way functions and PRGs. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 649–665. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14623-7_35

    Chapter  Google Scholar 

  15. Gavinsky, D.: Classical interaction cannot replace a quantum message. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 95–102 (2008)

    Google Scholar 

  16. Gravin, N., Guo, S., Kwok, T.C., Lu, P.: Concentration bounds for almost k-wise independence with applications to non-uniform security. In: Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 2404–2423. SIAM (2021)

    Google Scholar 

  17. Guo, S., Li, Q., Liu, Q., Zhang, J.: Unifying presampling via concentration bounds. In: Nissim, K., Waters, B. (eds.) TCC 2021. LNCS, vol. 13042, pp. 177–208. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90459-3_7

    Chapter  Google Scholar 

  18. Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 (1996)

    Google Scholar 

  19. Hellman, M.: A cryptanalytic time-memory trade-off. IEEE Trans. Inf. Theory 26(4), 401–406 (1980)

    Article  MathSciNet  MATH  Google Scholar 

  20. Hhan, M., Xagawa, K., Yamakawa, T.: Quantum random oracle model with auxiliary input. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. LNCS, vol. 11921, pp. 584–614. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34578-5_21

    Chapter  Google Scholar 

  21. Marriott, C., Watrous, J.: Quantum arthur-merlin games. Comput. Complex. 14(2), 122–152 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  22. Nayebi, A., Aaronson, S., Belovs, A., Trevisan, L.: Quantum lower bound for inverting a permutation with advice. CoRR, abs/1408.3193 (2014)

    Google Scholar 

  23. Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information, 10th edn. Cambridge University Press, Cambridge (2010)

    MATH  Google Scholar 

  24. Unruh, D.: Random oracles and auxiliary input. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 205–223. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74143-5_12

    Chapter  Google Scholar 

  25. Yao, A.C.: Coherent functions and program checkers. In: Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing, pp. 84–94 (1990)

    Google Scholar 

  26. Yamakawa, T., Zhandry, M.: Verifiable quantum advantage without structure. arXiv preprint arXiv:2204.02063 (2022)

  27. Zhandry, M.: Schrödinger’s Pirate: how to trace a quantum decoder. In: Pass, R., Pietrzak, K. (eds.) TCC 2020. LNCS, vol. 12552, pp. 61–91. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-64381-2_3

    Chapter  Google Scholar 

Download references

Acknowledgements

We would like to thank Kai-Min Chung for his discussion on an early write-up and providing an intuitive explanation of the decomposition of quantum advice in our work; Jiahui Liu and Luowen Qian for their comments on an early draft of this paper; Luowen Qian and Makrand Sinha for mentioning the connections between our impossibility result and quantum one-way communication complexity.

Qipeng Liu is supported in part by the Simons Institute for the Theory of Computing, through a Quantum Postdoctoral Fellowship, by DARPA under Agreement No. HR00112020023 and by the NSF QLCI program through grant number OMA-2016245. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Government or DARPA.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qipeng Liu .

Editor information

Editors and Affiliations

Appendices

A Proofs for the Useful Lemmas

Lemma 10

Let N be a positive integer and \(p_1, \cdots , p_N \in \mathbb {R}^{\ge 0}\). Let \(\alpha _1, \cdots , \alpha _N\) be a distribution over [N]: i.e., \(\alpha _i \in [0, 1]\) and \(\sum _{i \in [N]} \alpha _i = 1\).

Assume \(\mu := \sum _{i \in [N]} \alpha _i p_i > 0\). Let \(\beta _1, \cdots , \beta _N\) be another distribution over [N]: \(\beta _i := \alpha _i p_i / \mu \). The following holds:

$$\begin{aligned} \sum _{i \in [N]} \beta _i p_i \ge \sum _{i \in [N]} \alpha _i p_i. \end{aligned}$$

Proof

Let \({\textbf{X}}\) be a random variable that takes value \(p_i\) w.p. \(\alpha _i\). It is easy to see that \({\mathbb {E}}[{\textbf{X}}] = \sum _{i} \alpha _i p_i\) and \({\mathbb {E}}[{\textbf{X}}^2] = \sum _{i} \alpha _i p_i^2\).

Since we assume \(\mu = {\mathbb {E}}[{\textbf{X}}] > 0\), we rewrite the inequality as follows:

$$\begin{aligned} \sum _{i} \alpha _i p_i^2 \ge \left( \sum _{i} \alpha _i p_i\right) ^2. \end{aligned}$$

The lemma holds by observing that L.H.S. is \({\mathbb {E}}[{\textbf{X}}^2]\), R.H.S. is \({\mathbb {E}}[{\textbf{X}}]^2\) and the fact that \({\textbf{Var}}[{\textbf{X}}] := {\mathbb {E}}[{\textbf{X}}^2] - {\mathbb {E}}[{\textbf{X}}]^2 \ge 0\).    \(\square \)

Proof for Lemma 1. We fix any integer \(k \ge 1\). Let \(\alpha _i = c_i p_i^{k-1} / (\sum _i c_i p_i^{k-1})\). It it easy to see that \(S_k = \sum _{i} \alpha _i p_i\).

Let \(\beta _i = \alpha _i p_i / \mu \) where \(\mu = \sum _i \alpha _i p_i\). We have

$$\begin{aligned} \beta _i&= \alpha _i p_i / \mu \\&= \frac{c_i p_i^{k}}{\sum _i c_i p_i^{k-1} \cdot \mu }\\&= \frac{c_i p_i^{k}}{\sum _i c_i p_i^{k-1} \cdot \left( \sum _i c_i p_i^{k} / (\sum _i c_i p_i^{k-1}) \right) } \\&= \frac{c_i p_i^{k}}{\sum _i c_i p_i^{k}}. \end{aligned}$$

Therefore, \(S_{k+1} = \sum _i \beta _i p_i\). By Lemma 10, \(S_{k+1} = \sum _i \beta _i p_i \ge \sum _i \alpha _i p_i = S_{k}\).    \(\square \)

B Characterization of Alternating Measurements and Proof of Theorem 6

Fixing a function H, the intial internal register \(\textbf{A}\) of \(\mathcal {A}\) is \(|\sigma _H\rangle |0^L\rangle = \sum _{i} \alpha _{H, i} |\phi _{H, i}\rangle \). Let us define the following states \(|v_{H, i}^0\rangle , |v_{H, i}^1\rangle , |w_{H, i}^0\rangle , |w_{H, i}^1\rangle \) (for convenience, we ignore H in the subscripts in the analysis below). We will also ignore H for other notations like \(P^H_r, |\phi _{H, i}\rangle , p_{H, i}\) as our analysis does not depend on H and the final conclusion follows by taking expectation over uniformly random functions H. Instead, we are using \(P_r := P^H_{r}, |\phi _i\rangle :=|\phi _{H, i}\rangle , p_i := p_{H, i}\) in the analysis.

  1. 1.

    \(|w_i^0\rangle = \frac{1}{\sqrt{p_{i} |{\mathcal {R}}|}} \sum _r |r\rangle P_r |\phi _{i}\rangle \).

    It is easy to verify that it has norm 1:

    $$\begin{aligned} \langle w_i^0 | w_i^0\rangle = \frac{1}{p_i |{\mathcal {R}}|} \sum _r \langle \phi _i | P_r | \phi _i \rangle = \frac{1}{p_i |{\mathcal {R}}|} \langle \phi _i | (\sum _r P_r) | \phi _i \rangle =\frac{p_i |{\mathcal {R}}| }{p_i |{\mathcal {R}}|} \,= 1. \end{aligned}$$

    \({\textsf{CP}}^H_0 |w_i^0\rangle = |w_i^0\rangle \) and \({\textsf{CP}}^H_1 |w_i^0\rangle = 0\).

    After seeing the definition of \(|v_i^0\rangle \) and \(|v_i^1\rangle \) below, we also observe that \(|w_i^0\rangle = \sqrt{p_i} |v_i^0\rangle + \sqrt{1-p_i} |v_i^1\rangle \).

  2. 2.

    \(|w_i^1\rangle = \frac{1}{\sqrt{(1-p_{i}) |{\mathcal {R}}|}} \sum _r |r\rangle (\textbf{I}_{\textbf{A}}-P_r) |\phi _{i}\rangle \).

    Similarly, it has norm 1, \({\textsf{CP}}^H_1 |w_i^1\rangle = |w_i^1\rangle \) and \({\textsf{CP}}^H_0 |w_i^1\rangle = 0\).

  3. 3.

    \(|v^0_i\rangle = |\mathbbm {1}\rangle _{{\mathcal {R}}} |\phi _{i}\rangle = \sqrt{p_i} |w_i^0\rangle + \sqrt{1 - p_i} |w^1_i\rangle \).

    By the description of the game \(G^{\otimes k}\) (Definition 8), the overall register \(\textbf{R}\textbf{A}\) at the beginning of the game can be written as \(\sum _{i} \alpha _{i} |v^0_i\rangle \) (which we will prove below).

    The state has norm 1, \({\textsf{IsUniform}}^0 |v^0_i\rangle = |v^0_i\rangle \) and \({\textsf{IsUniform}}^1 |v^0_i\rangle = 0\).

  4. 4.

    \(|v_i^1\rangle = \sqrt{1 - p_i} |w_i^0\rangle - \sqrt{p_i} |w^1_i\rangle \).

    We will not use the property of \(|v_i^1\rangle \) in the proof and we thus omit all the details here.

Lemma 11

For any fixed H, for any non-negative integer k, the leftover state over \(\textbf{R}\textbf{A}\) conditioned on all outcomes in the first k rounds being 0s is in proportion to:

$$\begin{aligned} \sum _i \alpha _i p_i^{k/2} {\left\{ \begin{array}{ll} |v^0_i\rangle \text { if { k} is even}, \\ |w^0_i\rangle \text { if { k} is odd}. \end{array}\right. } \end{aligned}$$

The probability of all outcomes being 0s is \(\sum _i |\alpha _i|^2 p_i^k\).

The proof follows the proof of Claim 6.3 in [Zha20]. We reprove this claim for completeness.

Proof

This lemma holds for \(k=0\), when no measurement is applied. This is the state is

$$\begin{aligned} \sum _i \alpha _i |v^0_i\rangle = \sum _i \alpha _i |\mathbbm {1}_{{\mathcal {R}}}\rangle _\textbf{R}|\phi _i\rangle _\textbf{A}= |\mathbbm {1}_{{\mathcal {R}}}\rangle _\textbf{R}|\sigma _H, 0^L\rangle _\textbf{A}. \end{aligned}$$

We now prove by induction. Assume the lemma holds up to some even k. We prove it holds for odd \(k+1\).

The leftover state after the first k rounds is \(c \sum _i \alpha _i p_i^{k/2} |v_i^0\rangle \) for some normalization c. Note that \(|v^0_i\rangle = \sqrt{p_i} |w_i^0\rangle + \sqrt{1 - p_i} |w^1_i\rangle \). The state can be rewritten as

$$\begin{aligned} c \sum _i \alpha _i p_i^{k/2} \left( \sqrt{p_i} |w_i^0\rangle + \sqrt{1 - p_i} |w^1_i\rangle \right) . \end{aligned}$$

In the \((k+1)\)-th round, the challenger measures the state under \({\textsf{CP}}^H\). Note that \({\textsf{CP}}^H_0 |w_i^0\rangle = |w_i^0\rangle \) and \({\textsf{CP}}^H_0 |w_i^1\rangle = 0\). Thus, conditioned on the \((k+1)\)-th outcome being 0, the state is in proportion to \(\sum _i \alpha _i p_i^{(k+1)/2} |w_i^0\rangle \). We complete the induction for k being even.

For odd k, the analysis is almost identical, by observing \(|w_i^0\rangle = \sqrt{p_i} |v_i^0\rangle + \sqrt{1-p_i} |v_i^1\rangle \) and also following from the fact that \({\textsf{IsUniform}}^0 |v^0_i\rangle = |v^0_i\rangle \) and \({\textsf{IsUniform}}^1 |v^0_i\rangle = 0\).

Finally, the probability can be bounded by looking at the un-normalized states above.    \(\square \)

Theorem 6 follows from summing over all functions H and Lemma 11.

C Classical Version of Our Main Theorem

The following theorem is a classical version of our main theorem (Theorem 5), improved from Theorem 1 in [GLLZ21].

Theorem 13

Let G be any game with \(T_\textsf{Samp}, T_\textsf{Verify}\) being the number of queries made by \(\textsf{Samp}\) and \(\textsf{Verify}\). For any ST, let \(P = S (T + T_\textsf{Verify}+ T_\textsf{Samp})\).

If G has security \(\nu (P, T)\) in the P-BF-ROM, then it has security \(\delta (S, T) \le 2 \cdot \nu (P, T)\) against (ST) non-uniform classical algorithms with classical advice.

In Theorem 1 in [GLLZ21], \(P = (S + \log \gamma ^{-1}) (T + T_\textsf{Verify}+ T_\textsf{Samp})\) and there is an extra additive term \(\gamma \) for \(\delta (S, T)\).

Theorem 14

(Theorem 1 in [GLLZ21]). Let G be any game with \(T_\textsf{Samp}, T_\textsf{Verify}\) being the number of queries made by \(\textsf{Samp}\) and \(\textsf{Verify}\). For any \(S, T, \gamma > 0\), let \(P = (S + \log \gamma ^{-1}) (T + T_\textsf{Verify}+ T_\textsf{Samp})\).

If G has security \(\nu (P, T)\) in the P-BF-ROM, then it has security \(\delta (S, T) \le 2 \cdot \nu (P, T) + \gamma \) against (ST) non-uniform classical algorithms with classical advice.

D Proof for the Separation Result

Proof

We first show the second bullet point. Let the quantum algorithm in Theorem 11 be \(\mathcal {B}\). In the non-uniform quantum adversary, quantum advice is the non-adaptive queries made by \(\mathcal {B}\) and the online stage is the post-processing by \(\mathcal {B}\). It is straightforward that the non-uniform algorithm achieves the same probability as \(\mathcal {B}\), which is \(1 - \textsf{negl}(n)\). Since each query has \(O(\log n)\) qubits and \(\mathcal {B}\) makes \(\tilde{O}(n)\) queries, the total size of the quantum advice is still \(\tilde{O}(n)\).

Next, we show the first bullet point. In the first bullet point of this theorem, we do not distinguish between non-uniform quantum adversaries with classical advice and non-uniform classical adversaries. The reason is that the online algorithm does not make any query, i.e., \(T = 0\). These two types of algorithms are equivalent when \(T = 0\).

Thus, we consider success probabilities of non-uniform classical adversaries. By a classical analog of our main theorem Theorem 5 (Theorem 13), we only need to show its success probability in the P-BF-ROM (Definition 5) where \(P = S (T + T_\textsf{Samp}+ T_\textsf{Verify}) = S T_\textsf{Verify}= 2^{n^c}\).

Assume a random oracle is lazily sampled. In other words, an outcome of the random oracle on x is sampled only if the outcome is queried by an algorithm; otherwise, the outcome is marked as “not sampled”. Conditioned on any P-query f outputs 0, the random oracle is only fixed on P positions and the rest of its outputs are still not sampled. The error correcting code C used in [YZ22] satisfies a property called \((\zeta , \ell , L)\) list recoverability:

  • For any subset \(S_i \subseteq \varSigma \) such that \(|S_i| \le \ell \) for every \(i \in [n]\), we have

    $$\begin{aligned} |\textsf{Good}| = \left| \left\{ (x_1, \cdots , x_n) \in C : |\{ i \in [n]: x_i \in S_i\}| \ge (1-\zeta ) n \right\} \right| \le L. \end{aligned}$$

    In other words, the total number of codewords in C with hamming distance to \(S_1 \times S_2 \times \cdots \times S_n\) smaller than \(\zeta n\) is bounded by L. Here hamming distance to \(S_1 \times S_2 \times \cdots \times S_n\) is defined as the number of coordinates i whose \(x_i\) is not in the corresponding \(S_i\). We call this set of codewords \(\textsf{Good}\).

  • \(P = 2^{n^c} < \ell \), \(\zeta = \varOmega (1)\) and \(L = 2^{n^{c'}}\) for some \(0< c' < 1\).

In \(G_\textsf{YZ}\), when a challenge y is sampled uniformly at random from \(\{0,1\}^n\), there are two cases:

  • Case 1: there exists a codeword c in \(\textsf{Good}\), such that \(y = f^H_C(c)\). This case happens with probability at most \(|\textsf{Good}|/2^n \le L / 2^n\).

  • Case 2: complement of Case 1. In this case, an adversary wins only if it outputs a codeword that is not in \(\textsf{Good}\). For every codeword \(c = (x_1, x_2, \cdots , x_n) \not \in \textsf{Good}\), there are at least \(\zeta n\) coordinates whose random oracle outputs (i.e., \(H(i,x_i)\)) have not been sampled yet in the lazily sampled random oracle. For any \(c \not \in \textsf{Good}\), \(\Pr [f^H_C(c) = y] \le 2^{-\zeta n}\). Therefore, regardless of the algorithm’s output, the success probability is at most \(2^{-\zeta n}\).

The overall winning probability is bounded by \(L/2^n + 2^{-\zeta n} = 2^{-\varOmega (n)}\). We conclude the first bullet point of the theorem.

   \(\square \)

Rights and permissions

Reprints and permissions

Copyright information

© 2023 International Association for Cryptologic Research

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, Q. (2023). Non-uniformity and Quantum Advice in the Quantum Random Oracle Model. In: Hazay, C., Stam, M. (eds) Advances in Cryptology – EUROCRYPT 2023. EUROCRYPT 2023. Lecture Notes in Computer Science, vol 14004. Springer, Cham. https://doi.org/10.1007/978-3-031-30545-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30545-0_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30544-3

  • Online ISBN: 978-3-031-30545-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics