Overview
Syllabus
Intro
ZK against quantum attacks
The Round Complexity of ZK
Results
Main focus: Extractable Commitments
Quantumly-Extractable (Classical) Commitments
Traditional Extraction Techniques
The gap from classical techniques: Cloning No Cloning
Tools: Quantum Fully-Homomorphic Encryption
Tools: Compute-and-Compare (CC) Obfuscation
Simplification: Explainable Adversaries
st Try : No-Cloning Extraction
Tools: Circuit-Private FHE (SFE)
nd Try : No-Cloning Extraction
Problem: Malleability
rd (and last) Try: No-Cloning Extraction
Taught by
Association for Computing Machinery (ACM)