Cryptography in the Bounded-Quantum-Storage Model Christian Schaffner BRICS, University of Aarhus PhD Defense Friday, April 27 th 2007.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Advertisements

Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.
Implementation of Practically Secure Quantum Bit Commitment Protocol Ariel Danan School of Physics Tel Aviv University September 2008.
Spin chains and channels with memory Martin Plenio (a) & Shashank Virmani (a,b) quant-ph/ , to appear prl (a)Institute for Mathematical Sciences.
Christian Schaffner CWI Amsterdam, Netherlands Position-Based Quantum Cryptography: Impossibility and Constructions Seminar Eindhoven, Netherlands Wednesday,
Experimental Bit String Generation Serge Massar Université Libre de Bruxelles.
Short course on quantum computing Andris Ambainis University of Latvia.
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications Serge Fehr, Christian Schaffner (CWI Amsterdam, NL) Renato Renner (University.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Oblivious Transfer based on the McEliece Assumptions
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
Stanford vs. UC: The Big Game A. Datta, A. Derek, J. C. Mitchell, A. Ramanathan & A. Scedrov August 16, 2005.
Interactive Proofs For Quantum Computations Dorit Aharonov, Michael Ben-Or, Elad Eban School of Computer Science and Engineering The Hebrew University.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Bachelor.
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Workshop on Post-Quantum Security Models Paris, France Tuesday,
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 19 (2009)
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Amsterdam.
Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009.
Practical Aspects of Quantum Coin Flipping Anna Pappa Presentation at ACAC 2012.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Introduction to Quantum Key Distribution
Christian Schaffner, PhD student NF-årsfest 2005 A A R H U S U N I V E R S I T E T DAIMI – Department of Computer Science BRICS – Basic Research in Computer.
Entanglement sampling and applications Omar Fawzi (ETH Zürich) Joint work with Frédéric Dupuis (Aarhus University) and Stephanie Wehner (CQT, Singapore)
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Tropical QKD Waterloo, ON, Canada Wednesday, 16 June 2010.
Cryptography In the Bounded Quantum-Storage Model
PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Herzberg et al. Presented by: Avinash Ravi Kevin Skapinetz.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Cryptography Christian Schaffner
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography Christian Schaffner
Quantum Cryptography Antonio Acín
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Topic 36: Zero-Knowledge Proofs
J. Miranda University of Ottawa 21 November 2003
Coexistence Among Cryptography and Noisy Data Theory and Applications
COMPSCI 290.2: Computer Security
Quantum Cryptography Quantum Computing
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Quantum Cryptography Christian Schaffner
Brandin L Claar CSE 597E 5 December 2001
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Cryptography Quantum Computing
Richard Cleve DC 3524 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
Presentation transcript:

Cryptography in the Bounded-Quantum-Storage Model Christian Schaffner BRICS, University of Aarhus PhD Defense Friday, April 27 th 2007

2 / 38 Agenda  Motivation, Bit Commitment (BC)  Classical Protocol for BC  Quantum Effects  Quantum Protocol for BC  Conclusion

3 / 38 Alice & Bob Alice Bob *!¤

4 / 38 Alice Bob who gets the house? *!¤ Divorce Problems

5 / 38 Bad Bob Bob Coin-Flipping over the Telephone Alice [ B l um 82 ] It’s tails, I get the house!

6 / 38 A Coin-Flipping Protocol Alice Bob not random! Bad Bob

7 / 38 The Solution Alice Bob

8 / 38 The Explanation Alice Bad Bob

9 / 38 The Explanation Bob Bad Alice

10 / 38 Bob‘s view Bit-Commitment (BC) Scheme Alice Bob commit open important cryptographic primitive hiding binding Bad Bob Bad Alice

11 / 38 Agenda Motivation, Bit Commitment (BC)  Classical Protocol for BC  Quantum Effects  Quantum Protocol for BC  Conclusion

12 / 38 BC Impossible From Scratch perfectly secure, no assumptions (unbounded time and memory) with classical communication with quantum communication Alice Bob Bob‘s view open commit hiding binding bounded memory! [ M ayers 96, L o C h au 96 ]

13 / 38 Bob‘s view A Classical Bit-Commitment Protocol commit to 0: …01 Alice Bob bounded memory! (100 GB) commit to 1: …11 (100 GB each) perfectly hiding: non-interactive! binding? open: a checks correctness …11

14 / 38 Bob‘s view A Classical Bit-Commitment Protocol commit to 0: …01 Alice Bob commit to 1: …11 (n bits each) honest Alice needs n bits of memory Theorem: binding against cheating Alice with less than 2 ¢ n bits of memory bounded memory! open: a checks correctness …11

15 / 38 Bob‘s view A Classical Bit-Commitment Protocol commit to 0: …01 Alice Bob commit to 1: …11 (n bits each) honest Alice needs n bits of memory Theorem: binding against cheating Alice with less than 2 ¢ n bits of memory bounded memory! open: a checks correctness …11 unrealistic assumption: difficult to store classical bits only twice the honest player’s memory is required to break protocol

16 / 38 Bob‘s view A Quantum Bit-Commitment Protocol Alice Bob commit to 0: …01 commit to 1: …11 (n bits each) honest Alice needs n bits of memory Theorem: binding against cheating Alice with less than 2 ¢ n bits of memory bounded memory! open: a checks correctness …11 n quantum bits bounded quantum memory!

17 / 38 honest Alice needs n bits of memory Theorem: binding against cheating Alice with less than 2 ¢ n bits of memory Bob‘s view Quantum Bit-Commitment Protocol Alice Bob bounded quantum memory! n quantum bits no quantum bits (qubits) n/2 qubits open: a checks correctness …11

18 / 38 Agenda Motivation, Bit Commitment (BC) Classical Protocol for BC  Quantum Effects  Quantum Protocol for BC  Conclusion

19 / 38 Quantum Bit: e.g. Polarization of Light qu b i t asun i t vec t or i n C 2

20 / 38 j 0 i + j 1 i + qu b i t asun i t vec t or i n C 2 Qubit: Rectilinear Basis j 0 i + j 1 i +

21 / 38 j 0 i + j 1 i + j 0 i + qu b i t asun i t vec t or i n C 2 Detecting a Qubit Alice Bob no photon: 0 j 0 i + j 1 i +

22 / 38 j 0 i + j 1 i + j 0 i + qu b i t asun i t vec t or i n C 2 Measuring a Qubit Alice Bob no photon: 0 photon: 1 with prob. 1 yields 1 Measurement: j 0 i + j 1 i +

23 / 38 qu b i t asun i t vec t or i n C 2 Diagonal Basis j 1 i £ j 0 i £ j 0 i + j 1 i + j 0 i £ with prob. ½ yields 0 with prob. ½ yields 1 j 0 i + j 1 i + j 1 i £ Measurement:

24 / 38 qu b i t asun i t vec t or i n C 2 Quantum Effects j 1 i £ j 0 i £ j 0 i + j 1 i + with prob. ½ yields 0 with prob. ½ yields 1 Measurement:

25 / 38 qu b i t asun i t vec t or i n C 2 Quantum Effects j 1 i £ j 0 i £ j 0 i + j 1 i + with prob. ½ yields 0 with prob. ½ yields 1 Measurement:

26 / 38 Quantum Mechanics with prob. 1 yields 1 Measurements: + basis £ basis j 0 i + j 1 i + j 1 i £ j 0 i £ with prob. ½ yields 0 with prob. ½ yields 1

27 / 38 Agenda Motivation, Bit Commitment (BC) Classical Protocol for BC Quantum Effects  Quantum Protocol for BC  Conclusion

28 / 38 Quantum Bit-Commitment Protocol n quantum bits bounded quantum memory! picks at random:

29 / 38 Quantum Bit-Commitment Protocol n quantum bits picks at random: open: 11010

30 / 38 Quantum Bit-Commitment Protocol n quantum bits picks at random: open: accept

31 / 38 Quantum Bit-Commitment Protocol n quantum bits picks at random: open: accept measurement upon reception honest players need no quantum memory

32 / 38 Bob‘s view Cheating Bob: Hiding? n quantum bits picks at random: open: / perfectly hiding: non-interactive!

33 / 38 Cheating Alice: Binding? n quantum bits picks at random: open: / measuring destroys information with quantum memory: easy to cheat! bounded quantum memory!

34 / 38 Cheating Alice: Binding? n quantum bits picks at random: bad Alice does not know encoding bases needs to compress ) destroys information Theorem: binding as long as # qubits < n/2 open: / [ D amg º ar d F e h r S a l va i l S c h a ® ner 05 ]

35 / 38 Agenda Motivation, Bit Commitment (BC) Classical Protocol for BC Quantum Effects Quantum Protocol for BC  Conclusion

36 / 38 Summary Motivation:  Coin-Flipping over Telephone  Bit Commitment (BC) protocol for BC: perfectly hiding, binding for memory-bounded Alice classical: unpractical assumptions Bounded-Quantum-Storage Model:  showed quantum effects  BC: better parameters, practical!

37 / 38 QUSEP Project: Alice Bob

38 / 38 The End Alice bounded quantum memory! Bob bounded quantum memory! *!¤