{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:10:06Z","timestamp":1765113006656,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T00:00:00Z","timestamp":1685664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,2]]},"DOI":"10.1145\/3564246.3585198","type":"proceedings-article","created":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T17:34:20Z","timestamp":1684258460000},"page":"1579-1588","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Commitments to Quantum States"],"prefix":"10.1145","author":[{"given":"Sam","family":"Gunn","sequence":"first","affiliation":[{"name":"University of California at Berkeley, Berkeley, USA"}]},{"given":"Nathan","family":"Ju","sequence":"additional","affiliation":[{"name":"University of California at Berkeley, Berkeley, USA"}]},{"given":"Fermi","family":"Ma","sequence":"additional","affiliation":[{"name":"Simons Institute for the Theory of Computing, Berkeley, USA \/ University of California at Berkeley, Berkeley, USA"}]},{"given":"Mark","family":"Zhandry","sequence":"additional","affiliation":[{"name":"NTT Research, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536472"},{"key":"e_1_3_2_1_2_1","unstructured":"Dorit Aharonov Itai Arad and Thomas Vidick. 2013. The Quantum PCP Conjecture. CoRR abs\/1309.7495 ( 2013 ). arXiv: 1309.7495 http:\/\/arxiv.org\/abs\/1309.7495 \t\t\t\t  Dorit Aharonov Itai Arad and Thomas Vidick. 2013. The Quantum PCP Conjecture. CoRR abs\/1309.7495 ( 2013 ). arXiv: 1309.7495 http:\/\/arxiv.org\/abs\/1309.7495"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.57"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Prabhanjan Ananth Luowen Qian and Henry Yuen. 2022. Cryptography from Pseudorandom Quantum States. CRYPTO. https:\/\/ia.cr\/ 2021 \/1663. \t\t\t\t  Prabhanjan Ananth Luowen Qian and Henry Yuen. 2022. Cryptography from Pseudorandom Quantum States. CRYPTO. https:\/\/ia.cr\/ 2021 \/1663.","DOI":"10.1007\/978-3-031-15802-5_8"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/278298.278306"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/273865.273901"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/103418.103428"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181969"},{"key":"e_1_3_2_1_9_1","volume-title":"Alex Lombardi, Fermi Ma, Giulio Malavolta, Vinod Vaikuntanathan, Thomas Vidick, and Lisa Yang.","author":"Bartusek James","year":"2022","unstructured":"James Bartusek , Yael Tauman Kalai , Alex Lombardi, Fermi Ma, Giulio Malavolta, Vinod Vaikuntanathan, Thomas Vidick, and Lisa Yang. 2022 . Succinct Classical Verification of Quantum Computation (CRYPTO '22). James Bartusek, Yael Tauman Kalai, Alex Lombardi, Fermi Ma, Giulio Malavolta, Vinod Vaikuntanathan, Thomas Vidick, and Lisa Yang. 2022. Succinct Classical Verification of Quantum Computation (CRYPTO '22)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90459-3_10"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3188745.3188870"},{"key":"e_1_3_2_1_12_1","unstructured":"Zvika Brakerski Ran Canetti and Luowen Qian. 2022. On the computational hardness needed for quantum cryptography. Cryptology ePrint Archive Paper 2022 \/1181. https:\/\/eprint.iacr.org\/ 2022 \/1181 \t\t\t\t  Zvika Brakerski Ran Canetti and Luowen Qian. 2022. On the computational hardness needed for quantum cryptography. Cryptology ePrint Archive Paper 2022 \/1181. https:\/\/eprint.iacr.org\/ 2022 \/1181"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS46700.2020.00027"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/21M140729X"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_30"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2016.13"},{"key":"e_1_3_2_1_17_1","unstructured":"Lijie Chen and Ramis Movassagh. 2021. Quantum Merkle Trees. CoRR abs\/2112.14317 ( 2021 ). arXiv: 2112.14317 https:\/\/arxiv.org\/abs\/2112.14317 \t\t\t\t  Lijie Chen and Ramis Movassagh. 2021. Quantum Merkle Trees. CoRR abs\/2112.14317 ( 2021 ). arXiv: 2112.14317 https:\/\/arxiv.org\/abs\/2112.14317"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64381-2_7"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84242-0_12"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS52979.2021.00014"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_28"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1991.185341"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.47"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_11"},{"key":"e_1_3_2_1_25_1","unstructured":"Sam Gunn Nathan Ju Fermi Ma and Mark Zhandry. 2022. Commitments to Quantum States. Cryptology ePrint Archive Paper 2022 \/1358. https:\/\/eprint. iacr.org\/ 2022 \/1358 \t\t\t\t  Sam Gunn Nathan Ju Fermi Ma and Mark Zhandry. 2022. Commitments to Quantum States. Cryptology ePrint Archive Paper 2022 \/1358. https:\/\/eprint. iacr.org\/ 2022 \/1358"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250794"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_5"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/129712.129782"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10698-9_4"},{"key":"#cr-split#-e_1_3_2_1_31_1.1","unstructured":"Takeshi Koshiba and Takanori Odaira. 2011. Non-Interactive Statistically-Hiding Quantum Bit Commitment from Any Quantum One-Way Function. https: \/\/doi.org\/10.48550\/ARXIV.1102.3441 10.48550\/ARXIV.1102.3441"},{"key":"#cr-split#-e_1_3_2_1_31_1.2","unstructured":"Takeshi Koshiba and Takanori Odaira. 2011. Non-Interactive Statistically-Hiding Quantum Bit Commitment from Any Quantum One-Way Function. https: \/\/doi.org\/10.48550\/ARXIV.1102.3441"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.TQC.2021.2"},{"key":"e_1_3_2_1_33_1","volume-title":"Quantum Rewinding for Many-Round Protocols (TCC '22)","author":"Lai Russell W. F.","year":"2022","unstructured":"Russell W. F. Lai , Giulio Malavolta , and Nicholas Spooner . 2022 . Quantum Rewinding for Many-Round Protocols (TCC '22) . Russell W. F. Lai, Giulio Malavolta, and Nicholas Spooner. 2022. Quantum Rewinding for Many-Round Protocols (TCC '22)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS54457.2022.00086"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00033"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Tomoyuki Morimae and Takashi Yamakawa. 2022. Quantum commitments and signatures without one-way functions. CRYPTO. https:\/\/ia.cr\/ 2021 \/1691. \t\t\t\t  Tomoyuki Morimae and Takashi Yamakawa. 2022. Quantum commitments and signatures without one-way functions. CRYPTO. https:\/\/ia.cr\/ 2021 \/1691.","DOI":"10.1007\/978-3-031-15802-5_10"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_10"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_18"},{"volume-title":"Towards a formal definition of security for quantum protocols. Ph. D. Dissertation","author":"van de Graaf Jeroen","key":"e_1_3_2_1_39_1","unstructured":"Jeroen van de Graaf . 1997. Towards a formal definition of security for quantum protocols. Ph. D. Dissertation . University of Montreal. Jeroen van de Graaf. 1997. Towards a formal definition of security for quantum protocols. Ph. D. Dissertation. University of Montreal."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1137\/060670997"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Jun Yan. 2022. General properties of quantum bit commitment (ASIACRYPT '22). \t\t\t\t  Jun Yan. 2022. General properties of quantum bit commitment (ASIACRYPT '22).","DOI":"10.1007\/978-3-031-22972-5_22"},{"key":"e_1_3_2_1_42_1","volume-title":"International Symposium on Algorithms and Computation. Springer, 555-565","author":"Yan Jun","year":"2015","unstructured":"Jun Yan , Jian Weng , Dongdai Lin , and Yujuan Quan . 2015 . Quantum bit commitment with application in quantum zero-knowledge proof . In International Symposium on Algorithms and Computation. Springer, 555-565 . Jun Yan, Jian Weng, Dongdai Lin, and Yujuan Quan. 2015. Quantum bit commitment with application in quantum zero-knowledge proof. In International Symposium on Algorithms and Computation. Springer, 555-565."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2012.37"}],"event":{"name":"STOC '23: 55th Annual ACM Symposium on Theory of Computing","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Orlando FL USA","acronym":"STOC '23"},"container-title":["Proceedings of the 55th Annual ACM Symposium on Theory of Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564246.3585198","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564246.3585198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:01Z","timestamp":1750178821000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564246.3585198"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,2]]},"references-count":44,"alternative-id":["10.1145\/3564246.3585198","10.1145\/3564246"],"URL":"https:\/\/doi.org\/10.1145\/3564246.3585198","relation":{},"subject":[],"published":{"date-parts":[[2023,6,2]]},"assertion":[{"value":"2023-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}