Skip to main content

Showing 1–6 of 6 results for author: Çakan, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.16407  [pdf, ps, other

    quant-ph cs.CR

    Public-Key Quantum Fire and Key-Fire From Classical Oracles

    Authors: Alper Çakan, Vipul Goyal, Omri Shmueli

    Abstract: Quantum fire was recently formalized by Bostanci, Nehoran and Zhandry (STOC 25). This notion considers a distribution of quantum states that can be efficiently cloned, but cannot be converted into a classical string. Previously, work of Nehoran and Zhandry (ITCS 24) showed how to construct quantum fire relative to an inefficient unitary oracle. Later, the work of Bostanci, Nehoran, Zhandry gave a… ▽ More

    Submitted 23 April, 2025; originally announced April 2025.

  2. arXiv:2411.05176  [pdf, ps, other

    quant-ph cs.CR

    How to Delete Without a Trace: Certified Deniability in a Quantum World

    Authors: Alper Çakan, Vipul Goyal, Justin Raizes

    Abstract: Is it possible to comprehensively destroy a piece of quantum information, so that nothing is left behind except the memory of whether one had it at one point? For example, various works, most recently Morimae, Poremba, and Yamakawa (TQC 2024), show how to construct a signature scheme with certified deletion where a user who deletes a signature on m cannot later produce a signature for m. However,… ▽ More

    Submitted 7 November, 2024; originally announced November 2024.

  3. arXiv:2411.04482  [pdf, ps, other

    quant-ph cs.CR

    Anonymous Public-Key Quantum Money and Quantum Voting

    Authors: Alper Cakan, Vipul Goyal, Takashi Yamakawa

    Abstract: Quantum information allows us to build quantum money schemes, where a bank can issue banknotes in the form of authenticatable quantum states that cannot be cloned or counterfeited. Similar to paper banknotes, in existing quantum money schemes, a banknote consists of an unclonable quantum state and a classical serial number, signed by bank. Thus, they lack one of the most fundamental properties cry… ▽ More

    Submitted 7 November, 2024; originally announced November 2024.

  4. arXiv:2311.18318  [pdf, ps, other

    cs.CR

    Unclonable Cryptography with Unbounded Collusions and Impossibility of Hyperefficient Shadow Tomography

    Authors: Alper Çakan, Vipul Goyal

    Abstract: Quantum no-cloning theorem gives rise to the intriguing possibility of quantum copy protection where we encode a program or functionality in a quantum state such that a user in possession of k copies cannot create k+1 copies, for any k. Introduced by Aaronson (CCC'09) over a decade ago, copy protection has proven to be notoriously hard to achieve. Previous work has been able to achieve copy-protec… ▽ More

    Submitted 4 November, 2024; v1 submitted 30 November, 2023; originally announced November 2023.

    Comments: Theory of Cryptography Conference (TCC) 2024. Full version with proofs

  5. arXiv:2305.00356  [pdf

    quant-ph cs.CR

    Computational Quantum Secret Sharing

    Authors: Alper Çakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro

    Abstract: Quantum secret sharing (QSS) allows a dealer to distribute a secret quantum state among a set of parties so that certain subsets can reconstruct the secret, while unauthorized subsets obtain no information. While QSS was introduced over twenty years ago, previous works focused only on existence of perfectly secure schemes, and the share size of the known schemes is exponential even for access stru… ▽ More

    Submitted 29 April, 2023; originally announced May 2023.

  6. arXiv:2002.03433  [pdf, other

    cs.SE cs.AI cs.LG

    Importance-Driven Deep Learning System Testing

    Authors: Simos Gerasimou, Hasan Ferit Eniser, Alper Sen, Alper Cakan

    Abstract: Deep Learning (DL) systems are key enablers for engineering intelligent applications due to their ability to solve complex tasks such as image recognition and machine translation. Nevertheless, using DL systems in safety- and security-critical applications requires to provide testing evidence for their dependable operation. Recent research in this direction focuses on adapting testing criteria fro… ▽ More

    Submitted 9 February, 2020; originally announced February 2020.

    Comments: 12 pages