๐ค AI Summary
This work addresses the fundamental problem of whether linear-subsequent parallel Kac random walks can instantiate adaptively secure pseudorandom unitary (PRU) families supporting inverse queries. Leveraging a novel path-recording technique and quantum-safe reduction, we provide the first rigorous proof that this construction achieves both adaptive security and strong security against inverse queriesโthereby affirming the MPSY24 conjecture. To our knowledge, this is the first PRU construction simultaneously satisfying adaptive security and robustness under inverse queries, overcoming longstanding limitations in modeling unitary inversion within prior PRU designs. Compared to existing approaches, our construction features greater structural simplicity and enhanced practical realizability. It thus provides a new cryptographic primitive for post-quantum protocols relying on secure unitary operators.
๐ Abstract
Ma and Huang recently proved that the PFC construction, introduced by Metger, Poremba, Sinha and Yuen [MPSY24], gives an adaptive-secure pseudorandom unitary family PRU. Their proof developed a new path recording technique [MH24]. In this work, we show that a linear number of sequential repetitions of the parallel Kac's Walk, introduced by Lu, Qin, Song, Yao and Zhao [LQSY+24], also forms an adaptive-secure PRU, confirming a conjecture therein. Moreover, it additionally satisfies strong security against adversaries making inverse queries. This gives an alternative PRU construction, and provides another instance demonstrating the power of the path recording technique. We also discuss some further simplifications and implications.