Very good Insight on android security problems and malware. Nice Work !
Thank you for your kind words. Indeed, we worked hard to achieve the attributes you mentioned.
I do not find this second abstract more informative, and it is definitely less entertaining to read. I really like the original abstract because, despite its tale format, it really works as an informative abstract.
Sounds like a nice fable for young readers of [this book].
Here is the second (more informative) abstract:
We introduce a new quantum cryptographic primitive which we call
a tokenized signature scheme. Such a scheme can be used as an ordinary
digital signature scheme, with the additional property that the signer
can produce and distribute one-use quantum si
Thanks for the reply. (3) is an interesting case to think about and it does seem that these attacks could be very significant then. And of course it's always good to improve the theoretical guarantees even if this is only relevant against future attacks.
For (2) it still does seem that if the l
There are 3 interesting time scales to consider:
1) As long as nobody has a quantum computer, our results don't have any practical relevance. That's clear.
2) When malicious parties start having access to quantum computers, the situation becomes more shady. For the reasons you mention, if the
This result really surprised me! But I don't understand how it could be used in practice.
Let's say Alice and Bob are communicating over the internet using AES and Eve records all their messages. She's not making any queries and can't break anything.
Let's say Alice is a web server who retur
### Reviewer 1 ###
Summary of Result:
This submission studies a new notion called “partial-indistinguishability” in the context of circuit obfuscation and provides two instantiations of obfuscators (satisfying the new notion) of classical and quantum circuits respectively. Moreover, the constr