Abstract
In this work we first examine the hardness of solving various search problems by hybrid quantum-classical strategies, namely, by algorithms that have both quantum and classical capabilities. We then construct a hybrid quantum-classical search algorithm and analyze its success probability.
Regarding the former, for search problems that are allowed to have multiple solutions and in which the input is sampled according to arbitrary distributions, we establish their hybrid quantum-classical query complexities—i.e., given a fixed number of classical and quantum queries, determine what is the probability of solving the search task. At a technical level, our results generalize the framework for hybrid quantum-classical search algorithms recently proposed by Rosmanis [Ros22]. Namely, for an arbitrary distribution D on Boolean functions, the probability that an algorithm equipped with \(\tau _c\) classical queries and \(\tau _q\) quantum queries succeeds in finding a preimage of 1 for a function sampled from D is at most \(\nu _{D}\cdot (2\sqrt{\tau _c} + 2\tau _q+ 1)^2\), where \(\nu _{D}\) captures the average (over D) fraction of preimages of 1.
Regarding our second contribution, we design a hybrid algorithm which first spends all of its classical queries and in the second stage runs a “modified Grover” in which the initial state depends on the target distribution \({D}\). We then show how to analyze its success probability for arbitrary target distributions and, importantly, its optimality for the uniform and the Bernoulli distribution cases.
As applications of our hardness results, we first revisit and generalize the formal security treatment of the Bitcoin protocol called the Bitcoin backbone [Eurocrypt 2015], to a setting where the adversary has both quantum and classical capabilities, presenting a new hybrid honest majority condition necessary for the protocol to properly operate. Secondly, we re-examine the generic security of hash functions [PKC 2016] against quantum-classical hybrid adversaries.
The full version of the paper can be found at [CGS23].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
We remark that normalization is required as \(\omega \) might not be 1; for example, in the case of the Bernoulli distribution, \(\omega = m \eta \). Hence, normalization is needed so as to view \(w_i/w\) as a probability distribution.
- 2.
Dimensions may grow depending on the arrangement of the pseudo-classical queries.
References
Gorjan Alagic, Chen Bai, Jonathan Katz, and Christian Majenz. Post-quantum security of the even-mansour cipher. In Advances in Cryptology – EUROCRYPT 2022, pages 458–487. Springer, 2022.
Andris Ambainis, Mike Hamburg, and Dominique Unruh. Quantum security proofs using semi-classical oracles. In Advances in Cryptology – CRYPTO 2019, pages 269–295. Springer, 2019.
Gorjan Alagic, Christian Majenz, Alexander Russell, and Fang Song. Quantum-secure message authentication via blind-unforgeability. In Advances in Cryptology – EUROCRYPT 2020. Springer, 2020.
Andris Ambainis, Ansis Rosmanis, and Dominique Unruh. Quantum attacks on classical proof systems: The hardness of quantum rewinding. In 2014 IEEE 55th Annual Symposium on Foundations of Computer Science, pages 474–483. IEEE, 2014.
Charles H Bennett, Ethan Bernstein, Gilles Brassard, and Umesh Vazirani. Strengths and weaknesses of quantum computing. SIAM journal on Computing, 26(5):1510–1523, 1997.
Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, and Mark Zhandry. Random oracles in a quantum world. In Advances in Cryptology – ASIACRYPT 2011, pages 41–69. Springer, 2011.
Mihir Bellare and Phillip Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on Computer and Communications Security, pages 62–73, 1993.
Mihir Bellare and Phillip Rogaway. Optimal asymmetric encryption. In Advances in Cryptology–EUROCRYPT 1994, pages 92–111. Springer, 1994.
Mihir Bellare and Phillip Rogaway. The exact security of digital signatures-how to sign with rsa and rabin. In Advances in Cryptology–Eurocrypt 1996, pages 399–416. Springer, 1996.
Dan Boneh and Mark Zhandry. Secure signatures and chosen ciphertext security in a quantum computing world. In Advances in Cryptology – CRYPTO 2013, pages 361–379. Springer, 2013.
Sitan Chen, Jordan Cotler, Hsin-Yuan Huang, and Jerry Li. The complexity of nisq, 2022.
Nai-Hui Chia, Kai-Min Chung, and Ching-Yi Lai. On the need for large quantum depth. J. ACM, 70(1), jan 2023.
Céline Chevalier, Ehsan Ebrahimi, and Quoc-Huy Vu. On security notions for encryption in a quantum world. In Progress in Cryptology – INDOCRYPT 2022, pages 592–613. Springer, 2023.
Alexandru Cojocaru, Juan Garay, Aggelos Kiayias, Fang Song, and Petros Wallden. Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin’s Post-Quantum Security. Quantum, 7:944, 2023.
Alexandru Cojocaru, Juan Garay, and Fang Song. Generalized hybrid search and applications. Cryptology ePrint Archive, Paper 2023/798, 2023.
Matthew Coudron and Sanketh Menda. Computations with greater quantum depth are strictly more powerful (relative to an oracle). In Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, page 889-901, New York, NY, USA, 2020. Association for Computing Machinery.
Alessandro Chiesa, Peter Manohar, and Nicholas Spooner. Succinct arguments in the quantum random oracle model. In 17th International Theory of Cryptography Conference – TCC 2019, pages 1–29. Springer, 2019.
Jelle Don, Serge Fehr, and Yu-Hsuan Huang. Adaptive versus static multi-oracle algorithms, and quantum security of a split-key prf. In Eike Kiltz and Vinod Vaikuntanathan, editors, Theory of Cryptography, pages 33–51, Cham, 2022. Springer Nature Switzerland.
Jelle Don, Serge Fehr, Christian Majenz, and Christian Schaffner. Security of the Fiat-Shamir transformation in the quantum random-oracle model. In Advances in Cryptology – CRYPTO 2019, pages 356–383. Springer, 2019.
Jelle Don, Serge Fehr, Christian Majenz, and Christian Schaffner. Online-extractability in the quantum random-oracle model. In Advances in Cryptology – EUROCRYPT 2022, pages 677–706. Springer, 2022.
Cătălin Dohotaru and Peter Høyer. Exact quantum lower bound for grover’s problem. Quantum Information & Computation, 9(5):533–540, 2009.
Edward Eaton and Fang Song. Making Existential-unforgeable Signatures Strongly Unforgeable in the Quantum Random-oracle Model. In 10th Conference on the Theory of Quantum Computation, Communication and Cryptography – TQC 2015, volume 44 of Leibniz International Proceedings in Informatics (LIPIcs), pages 147–162. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, 2015.
Edward Eaton and Fang Song. A note on the instantiability of the quantum random oracle. In International Conference on Post-Quantum Cryptography, pages 503–523. Springer, 2020.
Eiichiro Fujisaki and Tatsuaki Okamoto. Secure integration of asymmetric and symmetric encryption schemes. Journal of Cryptology, 26(1):80–101, 2013. Preliminary version in CRYPTO 1999.
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, and Jacques Stern. RSA-OAEP is secure under the rsa assumption. Journal of Cryptology, 17(2):81–104, 2004. Preliminary version in CRYPTO 2001.
Lov K Grover. A fast quantum mechanical algorithm for database search. In Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pages 212–219. ACM, 1996.
Dennis Hofheinz, Kathrin Hövelmanns, and Eike Kiltz. A modular analysis of the fujisaki-okamoto transformation. In 15th International Theory of Cryptography Conference – TCC 2017, pages 341–371. Springer, 2017.
Yassine Hamoudi, Qipeng Liu, and Makrand Sinha. Quantum-classical tradeoffs in the random oracle model. CoRR, abs/2211.12954, 2022.
Andreas Hülsing, Joost Rijneveld, and Fang Song. Mitigating multi-target attacks in hash-based signatures. In 19th IACR International Conference on Public-Key Cryptography — PKC 2016, pages 387–416. Springer, 2016.
Joseph Jaeger, Fang Song, and Stefano Tessaro. Quantum key-length extension. In 19th International Theory of Cryptography Conference – TCC 2021, pages 209–239. Springer, 2021.
Hidenori Kuwakado and Masakatu Morii. Quantum distinguisher between the 3-round feistel cipher and the random permutation. In 2010 IEEE International Symposium on Information Theory, pages 2682–2685. IEEE, 2010.
John Preskill. Quantum computing in the NISQ era and beyond. Quantum, 2:79, 2018.
Ansis Rosmanis. Hybrid quantum-classical search algorithms. arXiv preprint arXiv:2202.11443, 2022.
Victor Shoup. OAEP reconsidered. In Advances in Cryptology–CRYPTO 2001, pages 239–259. Springer, 2001.
Xiaoming Sun and Yufan Zheng. Hybrid decision trees: Longer quantum time is strictly more powerful, 2019.
Dominique Unruh. Non-interactive zero-knowledge proofs in the quantum random oracle model. In Advances in Cryptology – EUROCRYPT 2015, pages 755–784. Springer, 2015.
Takashi Yamakawa and Mark Zhandry. Classical vs quantum random oracles. In Advances in Cryptology – EUROCRYPT 2021, pages 568–597. Springer, 2021.
Christof Zalka. Grover’s quantum searching algorithm is optimal. Physical Review A, 60(4):2746, 1999.
Mark Zhandry. Secure identity-based encryption in the quantum random oracle model. International Journal of Quantum Information, 13(04):1550014, 2015. Preliminary version in IACR CRYPTO 2012.
Mark Zhandry. How to record quantum queries, and applications to quantum indifferentiability. In Advances in Cryptology – CRYPTO 2019, pages 239–268. Springer, 2019.
Mark Zhandry. How to construct quantum random functions. Journal of the ACM (JACM), 68(5):1–43, 2021. Preliminary version in FOCS 2012.
Acknowledgements
J.G. was partially supported by NSF SaTC grants no. 2001082 and 2055694. F.S. was partially supported by NSF grant no. 1942706 (CAREER). J.G. and F.S. were also partially support by Sony by means of the Sony Research Award Program. A.C. acknowledges support from the National Science Foundation grant CCF-1813814, from the AFOSR under Award Number FA9550-20-1-0108 and the support of the Quantum Advantage Pathfinder (QAP) project, with grant reference EP/X026167/1 and the UK Engineering and Physical Sciences Research Council.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 International Association for Cryptologic Research
About this paper
Cite this paper
Cojocaru, A., Garay, J., Song, F. (2025). Generalized Hybrid Search with Applications to Blockchains and Hash Function Security. In: Chung, KM., Sasaki, Y. (eds) Advances in Cryptology – ASIACRYPT 2024. ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15492. Springer, Singapore. https://doi.org/10.1007/978-981-96-0947-5_3
Download citation
DOI: https://doi.org/10.1007/978-981-96-0947-5_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-96-0946-8
Online ISBN: 978-981-96-0947-5
eBook Packages: Computer ScienceComputer Science (R0)