Private-Key Quantum Money Scott Aaronson (MIT). Ever since theres been money, thereve been people trying to counterfeit it Previous work on the physics.

Slides:



Advertisements
Similar presentations
Quantum Money Scott Aaronson (MIT) Based partly on joint work with Ed Farhi, David Gosset, Avinatan Hassidim, Jon Kelner, Andy Lutomirski, and Peter Shor.
Advertisements

Closed Timelike Curves Make Quantum and Classical Computing Equivalent
Quantum Lower Bounds You probably Havent Seen Before (which doesnt imply that you dont know OF them) Scott Aaronson, UC Berkeley 9/24/2002.
Quantum Lower Bound for the Collision Problem Scott Aaronson 1/10/2002 quant-ph/ I was born at the Big Bang. Cool! We have the same birthday.
The Power of Unentanglement
How Much Information Is In Entangled Quantum States? Scott Aaronson MIT |
The Learnability of Quantum States Scott Aaronson University of Waterloo.
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Quantum Versus Classical Proofs and Advice Scott Aaronson Waterloo MIT Greg Kuperberg UC Davis | x {0,1} n ?
Quantum Copy-Protection and Quantum Money Scott Aaronson (MIT) | | | Any humor in this talk is completely unintentional.
Quantum Software Copy-Protection Scott Aaronson (MIT) |
The Future (and Past) of Quantum Lower Bounds by Polynomials Scott Aaronson UC Berkeley.
Limitations of Quantum Advice and One-Way Communication Scott Aaronson UC Berkeley IAS Useful?
How Much Information Is In A Quantum State? Scott Aaronson MIT |
Quantum Double Feature Scott Aaronson (MIT) The Learnability of Quantum States Quantum Software Copy-Protection.
Lower Bounds for Local Search by Quantum Arguments Scott Aaronson (UC Berkeley) August 14, 2003.
An Invitation to Quantum Complexity Theory The Study of What We Cant Do With Computers We Dont Have Scott Aaronson (MIT) QIP08, New Delhi BQP NP- complete.
Impagliazzos Worlds in Arithmetic Complexity: A Progress Report Scott Aaronson and Andrew Drucker MIT 100% QUANTUM-FREE TALK (FROM COWS NOT TREATED WITH.
Pretty-Good Tomography Scott Aaronson MIT. Theres a problem… To do tomography on an entangled state of n qubits, we need exp(n) measurements Does this.
Scott Aaronson Institut pour l'Étude Avançée Le Principe de la Postselection.
QMA/qpoly PSPACE/poly: De-Merlinizing Quantum Protocols Scott Aaronson University of Waterloo.
Oracles Are Subtle But Not Malicious Scott Aaronson University of Waterloo.
The Equivalence of Sampling and Searching Scott Aaronson MIT.
The Computational Complexity of Linear Optics Scott Aaronson and Alex Arkhipov MIT vs.
Quantum Computing with Noninteracting Bosons
Quantum Money from Hidden Subspaces Scott Aaronson (MIT) Joint work with Paul Christiano A A.
Quantum Money from Hidden Subspaces Scott Aaronson (MIT) Joint work with Paul Christiano A A.
New Developments in Quantum Money and Copy-Protected Software Scott Aaronson (MIT) Joint work with Paul Christiano A A.
Scott Aaronson (MIT) Based on joint work with John Watrous (U. Waterloo) BQP PSPACE Quantum Computing With Closed Timelike Curves.
Scott Aaronson (MIT) The Limits of Computation: Quantum Computers and Beyond.
Quantum Money from Hidden Subspaces Scott Aaronson and Paul Christiano.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Quantum Computing MAS 725 Hartmut Klauck NTU
Scott Aaronson (MIT) Forrelation A problem admitting enormous quantum speedup, which I and others have studied under various names over the years, which.
1 Vipul Goyal Abhishek Jain Rafail Ostrovsky Silas Richelson Ivan Visconti Microsoft Research India MIT and BU UCLA University of Salerno, Italy Constant.
Short course on quantum computing Andris Ambainis University of Latvia.
1 Adapted from Oded Goldreich’s course lecture notes.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Interactive Proofs For Quantum Computations Dorit Aharonov, Michael Ben-Or, Elad Eban School of Computer Science and Engineering The Hebrew University.
DANSS Colloquium By Prof. Danny Dolev Presented by Rica Gonen
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Cramer-Shoup is Plaintext Aware in the Standard Model Alexander W. Dent Information Security Group Royal Holloway, University of London.
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Ragesh Jaiswal Indian Institute of Technology Delhi Threshold Direct Product Theorems: a survey.
CS151 Complexity Theory Lecture 13 May 11, Outline proof systems interactive proofs and their power Arthur-Merlin games.
Foundations of Cryptography Lecture 6 Lecturer: Moni Naor.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Alternative Wide Block Encryption For Discussion Only.
Amplification and Derandomization Without Slowdown Dana Moshkovitz MIT Joint work with Ofer Grossman (MIT)
The question Can we generate provable random numbers? …. ?
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Quantum Cryptography Antonio Acín
Quantum Computing and the Limits of the Efficiently Computable Scott Aaronson (MIT) Papers & slides at
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Topic 36: Zero-Knowledge Proofs
Quantum tokens for digital signatures
On the Size of Pairing-based Non-interactive Arguments
Authenticated encryption
Modern symmetric-key Encryption
Topic 14: Random Oracle Model, Hashing Applications
Shadow Tomography of Quantum States
Scott Aaronson (UT Austin) MIT, November 20, 2018
Gentle Measurement of Quantum States and Differential Privacy
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Scott Aaronson (UT Austin) UNM, Albuquerque, October 18, 2018
Impossibility of SNARGs
Gentle Measurement of Quantum States and Differential Privacy *
Presentation transcript:

Private-Key Quantum Money Scott Aaronson (MIT)

Ever since theres been money, thereve been people trying to counterfeit it Previous work on the physics of money: In his capacity as Master of the Mint, Isaac Newton worked on making English coins harder to counterfeit (He also personally oversaw hangings of counterfeiters)

Today: Holograms, embedded strips, microprinting, special inks… Leads to an arms race with no obvious winner Problem: From a CS perspective, uncopyable cash seems impossible for trivial reasons Any printing device a good guy can build, a determined bad guy can also build x (x,x) is an easy computation

Whats done in practice: Have a trusted third party authorize every transaction OK, but sometimes you want cash, and that seems impossible to secure, at least in classical physics… (BitCoin: Trusted third party is distributed over the Internet)

The No-Cloning Theorem

First Idea in the History of Quantum Info Wiesner ~1969: Private-key quantum money Besides a classical serial number s, each bill has n qubits, secretly prepared in one of the four BB84 states |0,|1,|+,|- In a giant database, the bank stores f(s), a description of the quantum state | f(s) corresponding to serial number s Want to verify a bill? Take it to the bank. Bank uses knowledge of f(s) to measure each qubit of | f(s) in the correct basis: OR At least at a handwaving level, seems impossible to copy | f(s) if you dont know the right bases! Serial number:

The Decohering Money Problem Theres a reason why quantum money is not yet practical… Need a quantum memory (cf. Fernando Pastawskis talk) ! More fundamentally: wont verifying a bill necessarily destroy it? Answer: No! Gentle Measurement / Almost As Good As New Lemma Accept w.p. 1- damage by

The Giant Database Problem Isnt it cumbersome for the bank to remember a classical description f(s) of every bill in circulation? Solution (Bennett, Brassard, Breidbart, Wiesner 1982): Pseudorandom functions! Bank remembers just a single n-bit secret key k. Then each bill has the form Handwavy security argument for BBBW scheme: Suppose we could copy |$ s. Then either we could also copy the bills in Wiesners original scheme, or else wed be distinguishing f k from a truly random function f Cryptographic PRF Reinterpretation of Wiesners original scheme: Its just the BBBW scheme, but where f k (s)=A(k,s) for a random oracle A!

Still, if only the bank can verify the bills, doesnt that sort of defeat the purpose of cash? Indeed! Thats why lots of recent work has been on public-key quantum money (A. 2009), which anyone could verify This inherently requires a computational assumptionnot just quantum mechanics! (Why?) A A Farhi et al. 2011: Quantum money from knots | A.-Christiano 2012: Quantum money from hidden subspaces Provable black-box security! And non- black-box security under a plausible crypto assumption Main Proposals:

Goal of This Talk: Use our new understanding of public-key quantum money, to go back and solve open problems about private-key quantum money Open problems? About private-key quantum money? 1.Are the Wiesner and BBBW schemes really secure? 2.Does every private-key money scheme require either a giant database, or else a computational assumption? 3.The interactive attack problem:

Our Results (paper still in preparation) 1.Rigorous, unified security proof for Wiesner and BBBW schemes (building on Werner, Molina-Vidick-Watrous, Gavinsky, Pastawski et al…) 2.Information-theoretic break of any BBBW-like scheme (most technically-novel part) 3.First private-key quantum money scheme provably secure against interactive attack (building on A.-Christiano) First we need some formal definitions…

Consists of two polynomial-time quantum algorithms: S has completeness error if for all k and valid $, S has soundness error if for all polynomial-time counterfeiters C, where Count returns the number of Cs r>q output registers ¢ 1,…,¢ r that Ver(k, ) accepts Bank(k): Generates quantum banknote $ Ver(k, ¢): Accepts or rejects claimed banknote ¢ Private-Key Quantum Money Scheme Mini-Scheme: Only needs to be secure in the special case q=1 and r=2 Well use as a crucial building block, as A.-Christiano did for public-key schemes

Theorem (Molina-Vidick-Watrous 2012): The Wiesner mini-scheme has soundness error (3/4) n (And this is tight, by a non-obvious counterfeiting strategy!) Proof uses SDP / quantum games formalism Wiesner Mini-Scheme Gavinsky 2011: Can even make all communication between verifier and bank classical Pastawski et al. 2012: Can even tolerate noise (with no serial numbers)

Theorem: Suppose M is insecure. Then either the underlying mini-scheme M was insecure, or else f k wasnt really a pseudorandom function Standard Construction of a Money Scheme M from a Mini-Scheme M Note: Wiesner and BBBW schemes handled in unified way! Intuitively obvious, but still need to prove it!

Proof Sketch Break M as a mini-scheme Distinguish f k from random Break M as a money scheme OR Intuition: If you can copy bills with the same serial numbers, you can break the mini-scheme M. If you can create bills with new serial numbers, then a hybrid argument / simulating the banks verification yourself lets you distinguish f k from a random function

Let M be any money scheme where the bank has an n-bit secret key k *. Then M can be broken using O(n 5 ) legitimate money states |$ k*, O(n) trial verifications, and 2 n poly(n) quantum computation time. The Tradeoff Theorem Why isnt this obvious? Because essentially the only way to learn about k * is using the states |$ k* but measuring |$ k* could destroy it! Also, |$ k* might happen to be accepted by many keys k other than true one WIESNER BBBW

Secret Acceptor Lemma Let M 1,…,M N be known 2-outcome POVMs Let be an unknown state Suppose were promised there exists an i * [N] such that theres a measurement strategy to find an i [N] such that Then given r, where with success probability 1-1/N.

Proof Sketch Almost As Good As New Lemma Quantum OR Bound (A. 2006) If some M i accepts with (1) probability, then applying M 1,…,M N to in succession also accepts with (1) probability Amplification / Chernoff Bound k M1M1 M2M2 M3M3 M4M4 M5M5 M6M6 M7M7 M8M8 Is there an M i in this half that accepts with p- /(logN) probability? What about in this half? The Strategy: Do a binary search for M i, decreasing the acceptance threshold by /(logN) at each level, and using fresh copies of

The Counterfeiting Strategy Let S be the set of keys still in the running. Initially S={0,1} n Repeat O(n) times: Submitfor trial verification (if S is accepted, then halt!) If S is rejected, then let U be the set of all keys k such that Ver(k, S ) rejects with high probability (at least one such k must exist, namely k * ) Use Secret Acceptor Lemma, and O(n 4 ) copies of |$ k*, to find a key k U such that Ver(k,|$ k* ) accepts with high probability (again, at least one such k must exist, namely k * ) Eliminate from S every key k S such that Ver(k,|$ k ) rejects with high probability (k* itself must survive this) Crucial observation: S shrinks by a constant factor at each iteration

S = Still in the running All 2 n possible quantum money states All 2 n possible verifiers U = Rejects a random state in S w.h.p. Find some verifier k U (not necessarily k * ) that nevertheless accepts |$ k* w.h.p. U Throw out everything in S that Ver(k, ) rejects w.h.p. S

Interactive Security We want a private-key quantum money scheme that remains secure, even if the counterfeiter can start with poly(n) legitimate bills, then repeatedly modify them and submit for verification Gavinsky did this, but in his scheme, the bill gets destroyed after ~n verifications Farhi et al. showed that, if the verification is just a projection, then we cant have interactive security with unentangled bills Observation: Such a scheme follows from my previous work with Christiano on public-key quantum money

Theorem (A.-Christiano 2012): Even given membership oracles for A and A, any counterfeiter needs ( 2 n/4 ) quantum queries to copy |$ A with success probability The Hidden Subspace Mini-Scheme Quantum money state: |$ A is easy to prepare, given a basis for A. Its also easy to verify, given only membership oracles for A and A A.-Christiano proposed a cryptographic way to instantiate such membership oracles, without revealing Abut not directly relevant here Proof uses modification of Ambainiss quantum adversary method

Corollary: Considered as a private-key mini-scheme, the hidden subspace scheme must be secure against interactive attacks! (With no computational or oracle assumptions) Proof: Suppose an interactive attack existed. Then a public-key counterfeiter could simulate that attack, using membership oracles for A and A to simulate the banks verification. Hed thereby break the public-key scheme, which we already proved to be secure against such counterfeiters.

Improve the n 5 from our Tradeoff Theorem? Does private-key quantum money without a giant database require one-way functions? We know it requires some computational assumption Can we have private-key quantum money secure against interactive attack, without highly-entangled bills? Farhi et al. show that if so, verification will need to be non-projective Can we have unconditionally-secure public-key quantum money, relative to a random oracle? If we remove the word public-key or the word random, then yes Private-key quantum copy-protection? Open Problems

The (3/4) n Counterfeiting Strategy For each qubit in the money state, map (Note: Obvious strategy only succeeds with (5/8) n probability!)