{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T16:10:05Z","timestamp":1750695005173,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","funder":[{"name":"AFORS","award":["FA9550-21-1-036"],"award-info":[{"award-number":["FA9550-21-1-036"]}]},{"name":"NSF (National Science Foundation)","award":["CCF2144219"],"award-info":[{"award-number":["CCF2144219"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,15]]},"DOI":"10.1145\/3717823.3718195","type":"proceedings-article","created":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T23:34:42Z","timestamp":1750030482000},"page":"201-212","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A General Quantum Duality for Representations of Groups with Applications to Quantum Money, Lightning, and Fire"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9666-7114","authenticated-orcid":false,"given":"John","family":"Bostanci","sequence":"first","affiliation":[{"name":"Columbia University, New York City, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7371-0829","authenticated-orcid":false,"given":"Barak","family":"Nehoran","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7071-6272","authenticated-orcid":false,"given":"Mark","family":"Zhandry","sequence":"additional","affiliation":[{"name":"NTT Research, Sunnyvale, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2009.42"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Scott Aaronson Yosi Atia and Leonard Susskind. 2020. On the Hardness of Detecting Macroscopic Superpositions. https:\/\/doi.org\/10.48550\/arXiv.2009.07450 arxiv:2009.07450. 10.48550\/arXiv.2009.07450","DOI":"10.48550\/arXiv.2009.07450"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2213983"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84242-0_19"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Dorit Aharonov and Tomer Naveh. 2002. Quantum NP - A Survey. https:\/\/doi.org\/10.48550\/arXiv.quant-ph\/0210077 arxiv:quant-ph\/0210077. 10.48550\/arXiv.quant-ph\/0210077","DOI":"10.48550\/arXiv.quant-ph"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357713.3384304"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Dave Bacon Isaac L Chuang and Aram W Harrow. 2005. The quantum Schur transform: I. efficient qudit circuits. arXiv preprint quant-ph\/0601001 https:\/\/doi.org\/10.48550\/arXiv.quant-ph\/0601001 10.48550\/arXiv.quant-ph\/0601001","DOI":"10.48550\/arXiv.quant-ph"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618260.3649673"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564246.3585179"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258548"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.22331\/q-2023-01-19-901"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"John Bostanci Barak Nehoran and Mark Zhandry. 2024. A General Quantum Duality for Representations of Groups with Applications to Quantum Money Lightning and Fire. arXiv preprint arXiv:2411.00529 https:\/\/doi.org\/10.48550\/arXiv.2411.00529 10.48550\/arXiv.2411.00529","DOI":"10.48550\/arXiv.2411.00529"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1103\/PRXQuantum.5.010329"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618260.3649704"},{"key":"e_1_3_2_1_15_1","volume-title":"Lecture notes on quantum algorithms. Lecture notes at University of Maryland, 5","author":"Childs Andrew M","year":"2017","unstructured":"Andrew M Childs. 2017. Lecture notes on quantum algorithms. Lecture notes at University of Maryland, 5 (2017)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70918-3_51"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618260.3649779"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.22331\/q-2024-05-02-1330"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5307"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"D. Coppersmith. 1994. An approximate Fourier transform useful in quantum factoring. https:\/\/doi.org\/10.48550\/arXiv.quant-ph\/0201067 arxiv:quant-ph\/0201067. 10.48550\/arXiv.quant-ph\/0201067","DOI":"10.48550\/arXiv.quant-ph"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090260"},{"key":"e_1_3_2_1_22_1","first-page":"24","article-title":"A new class of linear correcting codes","volume":"6","author":"Goppa Valerii Denisovich","year":"1970","unstructured":"Valerii Denisovich Goppa. 1970. A new class of linear correcting codes. Problemy Peredachi Informatsii, 6, 3 (1970), 24\u201330.","journal-title":"Problemy Peredachi Informatsii"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"W. T. Gowers and O. Hatami. 2016. Inverse and stability theorems for approximate representations of finite groups. https:\/\/doi.org\/10.48550\/arXiv.1510.04085 arxiv:1510.04085. 10.48550\/arXiv.1510.04085","DOI":"10.48550\/arXiv.1510.04085"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897518.2897585"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","unstructured":"Aram W Harrow. 2005. Applications of coherent classical communication and the Schur transform to quantum information theory. arXiv preprint quant-ph\/0512255 https:\/\/doi.org\/10.48550\/arXiv.quant-ph\/0512255 10.48550\/arXiv.quant-ph\/0512255","DOI":"10.48550\/arXiv.quant-ph"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30545-0_22"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","unstructured":"Taiga Hiroka Fuyuki Kitagawa Ryo Nishimaki and Takashi Yamakawa. 2024. Robust Combiners and Universal Constructions for Quantum Cryptography. In TCC. https:\/\/doi.org\/10.1007\/978-3-031-78017-2_5 10.1007\/978-3-031-78017-2_5","DOI":"10.1007\/978-3-031-78017-2_5"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"Peter H\u00f8yer. 1997. Efficient Quantum Transforms. https:\/\/doi.org\/10.48550\/arXiv.quant-ph\/9702028 arxiv:quant-ph\/9702028. 10.48550\/arXiv.quant-ph\/9702028","DOI":"10.48550\/arXiv.quant-ph"},{"key":"e_1_3_2_1_29_1","first-page":"60","article-title":"Quantum Money from Quaternion Algebras","volume":"2","author":"Kane Daniel M.","year":"2022","unstructured":"Daniel M. Kane, Shahed Sharif, and Alice Silverberg. 2022. Quantum Money from Quaternion Algebras. Mathematical Cryptology, 2, 1 (2022), Oct., 60\u201383. https:\/\/journals.flvc.org\/mathcryptology\/article\/view\/132132","journal-title":"Mathematical Cryptology"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129055X06002565"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2207.13135"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68394-7_4"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.22331\/q-2019-02-14-122"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","unstructured":"Martin Larocca and Vojtech Havlicek. 2024. Quantum algorithms for representation-theoretic multiplicities. arXiv preprint arXiv:2407.17649 https:\/\/doi.org\/10.48550\/arXiv.2407.17649 10.48550\/arXiv.2407.17649","DOI":"10.48550\/arXiv.2407.17649"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30545-0_21"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","unstructured":"Andrew Lutomirski Scott Aaronson Edward Farhi David Gosset Avinatan Hassidim Jonathan Kelner and Peter Shor. 2009. Breaking and making quantum money: toward a new quantum cryptographic protocol. https:\/\/doi.org\/10.48550\/arXiv.0912.3825 arxiv:0912.3825. 10.48550\/arXiv.0912.3825","DOI":"10.48550\/arXiv.0912.3825"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68394-7_5"},{"key":"e_1_3_2_1_38_1","first-page":"114","article-title":"A public-key cryptosystem based on algebraic coding theory","volume":"4244","author":"McEliece Robert J","year":"1978","unstructured":"Robert J McEliece. 1978. A public-key cryptosystem based on algebraic coding theory. Coding Thv, 4244 (1978), 114\u2013116.","journal-title":"Coding Thv"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-024-09521-6"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198513.1198525"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-96-0947-5_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ITCS.2024.82"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897518.2897544"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055399.3055454"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77886-6_19"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-9458-7"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539796298637"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","unstructured":"Harshdeep Singh. 2019. Code based cryptography: Classic McEliece. arXiv preprint arXiv:1907.12754 https:\/\/doi.org\/10.48550\/arXiv.1907.12754 10.48550\/arXiv.1907.12754","DOI":"10.48550\/arXiv.1907.12754"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0776-8"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008920"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22972-5_22"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.117.090502"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-020-09372-x"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ITCS.2024.101"}],"event":{"name":"STOC '25: 57th Annual ACM Symposium on Theory of Computing","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Prague Czechia","acronym":"STOC '25"},"container-title":["Proceedings of the 57th Annual ACM Symposium on Theory of Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3717823.3718195","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T15:43:09Z","timestamp":1750693389000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3717823.3718195"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,15]]},"references-count":55,"alternative-id":["10.1145\/3717823.3718195","10.1145\/3717823"],"URL":"https:\/\/doi.org\/10.1145\/3717823.3718195","relation":{},"subject":[],"published":{"date-parts":[[2025,6,15]]},"assertion":[{"value":"2025-06-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}