+ All Categories
Home > Documents > Quantum Cryptography beyond Key Distribution

Quantum Cryptography beyond Key Distribution

Date post: 06-Feb-2016
Category:
Upload: xiu
View: 37 times
Download: 0 times
Share this document with a friend
Description:
Quantum Cryptography beyond Key Distribution. Christian Schaffner CWI Amsterdam, Netherlands. Tropical QKD Waterloo, ON, Canada Wednesday, 16 June 2010. Outline. Cryptographic Primitives Noisy -Storage Model Position- Based Quantum Cryptography Conclusion. Cryptography. - PowerPoint PPT Presentation
Popular Tags:
25
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Tropical QKD Waterloo, ON, Canada Wednesday, 16 June 2010
Transcript
Page 1: Quantum  Cryptography beyond Key Distribution

Christian SchaffnerCWI Amsterdam, Netherlands

Quantum Cryptography beyond

Key Distribution

Tropical QKDWaterloo, ON, CanadaWednesday, 16 June 2010

Page 2: Quantum  Cryptography beyond Key Distribution

2 Outline

Cryptographic Primitives

Noisy-Storage Model

Position-Based Quantum Cryptography

Conclusion

Page 3: Quantum  Cryptography beyond Key Distribution

3Cryptography

settings where parties do not trust each other: secure communication authentication

AliceBob

Eve

three-party scenario

= ?

use the same quantum hardware for applications in two- and multi-party scenarios

Page 4: Quantum  Cryptography beyond Key Distribution

4

I’m Alice, my PIN is 4049

I want $50

Alright Alice, here you go.

(example stolen from Louis Salvail)

Modern-Day Cryptography

Page 5: Quantum  Cryptography beyond Key Distribution

5Modern-Day Cryptography

I’m Alice my PIN is 4049

I want $50

Sorry, I’m out of order

Alice: 4049

Page 6: Quantum  Cryptography beyond Key Distribution

6

Modern-Day Cryptography

Alright Alice, here you go.

Alice: 4049 I’m Alice,

my PIN is 4049I want $500.000

Page 7: Quantum  Cryptography beyond Key Distribution

7Where It Went Wrong

I’m Alice my PIN is 4049

I want $50

Page 8: Quantum  Cryptography beyond Key Distribution

8

=

Secure Evaluation of the Equality

PIN-based identification scheme should be a secure evaluation of the equality function

dishonest player can exclude only one possible password

a

a = b?

?b

a = b?

Page 9: Quantum  Cryptography beyond Key Distribution

9

IDEAL

REAL

f

Secure Function Evaluation: Definition

we have: protocol

x yf(x,y)

we want: ideal functionality

security: if REAL looks like IDEAL to the outside world

f(x,y)

Page 10: Quantum  Cryptography beyond Key Distribution

10

f

we have: protocol

x

f(x,y)

yf(x,y)

we want: ideal functionality

security: if REAL looks like IDEAL to the outside world

IDEAL

REAL

Secure Function Evaluation: Dishonest Alice

Page 11: Quantum  Cryptography beyond Key Distribution

11

f

Secure Function Evaluation: Dishonest Bob

we have: protocol

x

f(x,y)

yf(x,y)

we want: ideal functionality

security: if REAL looks like IDEAL to the outside world

IDEAL

REAL

Page 12: Quantum  Cryptography beyond Key Distribution

12

Modern Cryptography

two-party scenarios:

password-based identification (=) millionaire‘s problem (<) dating problem (AND)

multi-party scenarios:

sealed-bid auctions e-voting …

use QKD hardware for applications in two- and multi-party scenarios

Page 13: Quantum  Cryptography beyond Key Distribution

13

In the plain model (no restrictions on adversaries, using quantum communication, as in QKD):

Secure function evaluation is impossible (Lo ‘97)

Restrict the adversary: Computational assumptions (e.g. factoring or

discrete logarithms are hard)

Can we implement these primitives?

unproven

Page 14: Quantum  Cryptography beyond Key Distribution

14

use the technical difficulties in building a quantum computer to our advantage

storing quantum information is a technical challenge

Bounded-Quantum-Storage Model :bound the number of qubits an adversary can store (Damgaard, Fehr, Salvail, S ‘05)

Noisy-(Quantum-)Storage Model:more general and realistic model (Wehner, S, Terhal ’07; König, Wehner, Wullschleger ‘09)

Exploit Quantum-Storage Imperfections

Conversion can fail Error in storage Readout can fail

Page 15: Quantum  Cryptography beyond Key Distribution

15 Outline

Cryptographic Primitives

Noisy-Storage Model

Position-Based Quantum Cryptography

Conclusion

Page 16: Quantum  Cryptography beyond Key Distribution

16

The Noisy-Storage Model (Wehner, S, Terhal ’07)

Page 17: Quantum  Cryptography beyond Key Distribution

17

what an (active) adversary can do: change messages computationally all-powerful unlimited classical storage actions are ‘instantaneous’

restriction: noisy quantum storage

The Noisy-Storage Model (Wehner, S, Terhal ’07)

waiting time: ¢t

Page 18: Quantum  Cryptography beyond Key Distribution

18

The Noisy-Storage Model (Wehner, S, Terhal ’07)

Arbitrary encoding

attack

Unlimited classical storage

change messages computationally all-powerful unlimited classical storage actions are ‘instantaneous’

waiting time: ¢t

Adversary’s state Noisy quantum storage

models: decoherence in memory transfer into storage (photonic states onto different carrier)

Page 19: Quantum  Cryptography beyond Key Distribution

19

natural conditions on the storage channel:

waiting does not help:

The Noisy-Storage Model

Arbitrary encoding

attack Noisy quantum storage

Unlimited classical storageAdversary’s

state

during waiting time: ¢t

Page 20: Quantum  Cryptography beyond Key Distribution

20

General case [König Wehner Wullschleger arxiv:0906.1030]: Storage channels with “strong converse” property, e.g.

depolarizing channel Some simplifications [S arxiv:1002.1495]

Protocol Structure20

weak string erasure

waiting time: ¢t

quantum part as in BB84

Noisy quantum storage

Page 21: Quantum  Cryptography beyond Key Distribution

21 Outline

Cryptographic Primitives

Noisy-Storage Model

Position-Based Quantum Cryptography

Conclusion

Page 22: Quantum  Cryptography beyond Key Distribution

22

Position-Based Quantum Cryptography

Prover wants to convince verifiers that she is at a particular position

assumptions: communication at speed of light instantaneous computation verifiers can coordinate

no coalition of (fake) provers, i.e. not at the claimed position, can convince verifiers

Verifier1 Verifier2Prover

[Malaney: 1004.4689, Chandran Fehr Gelles Goyal Ostrovsky: 1005.1750]

classically impossible ! even using computational assumptions

Page 23: Quantum  Cryptography beyond Key Distribution

23

Position-Based Quantum Cryptography

intuitively: security follows from no cloning formally, usage of recently established strong

complementary information trade-off

Verifier1 Verifier2Prover

[Chandran Fehr Gelles Goyal Ostrovsky: 1005.1750]

Page 24: Quantum  Cryptography beyond Key Distribution

24

Position-Based Quantum Cryptography

can be generalized to more dimensions basic scheme for secure positioning more advanced schemes allow message authentication

and key distribution connections to entropic uncertainty relations and

non-local games many open questions

Verifier1 Verifier2Prover

[Chandran Fehr Gelles Goyal Ostrovsky: 1005.1750]

Page 25: Quantum  Cryptography beyond Key Distribution

25Conclusion

=

cryptographic primitives

noisy-storage model: well-defined adversary model composable security definitions

position-based q cryptography

QKD hardware and know-how is useful in applications beyond key distribution


Recommended