Princeton University COS 433 Cryptography Fall 2007 Boaz Barak COS 433: Cryptography Princeton University Fall 2007 Boaz Barak Lecture 12: Idiot’s Guide.

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

Quantum Computation and Quantum Information – Lecture 2
Use of Time as a Quantum Key By Caleb Parks and Dr. Khalil Dajani.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
1 quantum teleportation David Riethmiller 28 May 2007.
Foundations of Cryptography Lecture 4 Lecturer: Moni Naor.
Short course on quantum computing Andris Ambainis University of Latvia.
Quantum Computing MAS 725 Hartmut Klauck NTU
Great Theoretical Ideas in Computer Science.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Public Key Algorithms …….. RAIT M. Chatterjee.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
A Brief Introduction to Quantum Computation 1 Melanie Mitchell Portland State University 1 This talk is based on the following paper: E. Rieffel & W. Polak,
Introduction to Modern Cryptography Lecture 5 Number Theory: 1. Quadratic residues. 2. The discrete log problem. Intro to Public Key Cryptography Diffie.
Princeton University COS 433 Cryptography Fall 2007 Boaz Barak COS 433: Cryptography Princeton University Fall 2007 Boaz Barak Lecture 12: Idiot’s Guide.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 12: Idiot’s Guide.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
CSE 321 Discrete Structures Winter 2008 Lecture 8 Number Theory: Modular Arithmetic.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
Quantum Computers Todd A. Brun Communication Sciences Institute USC.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Quantum Computation and Quantum Information – Lecture 2 Part 1 of CS406 – Research Directions in Computing Dr. Rajagopal Nagarajan Assistant: Nick Papanikolaou.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Lecture 6: Public Key Cryptography
Presented by: Erik Cox, Shannon Hintzman, Mike Miller, Jacquie Otto, Adam Serdar, Lacie Zimmerman.
Dominique Unruh 3 September 2012 Quantum Cryptography Dominique Unruh.
Cryptography Lecture 8 Stefan Dziembowski
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Alice and Bob’s Excellent Adventure
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Great Theoretical Ideas in Computer Science.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 2117 Lecture.
Cryptography Lecture 9 Stefan Dziembowski
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Michele Mosca Canada Research Chair in Quantum Computation 27 May 2006 Introduction to quantum technologies: quantum computers, quantum teleporters & cryptography.
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Wednesday, October 31 Ford Final Chapter (10). Agenda Announce: –Test Wednesday –Office Hours probably busy…better book appt. –Read Chs. 1-3 of Vilekin.
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Quantum Computing Michael Larson. The Quantum Computer Quantum computers, like all computers, are machines that perform calculations upon data. Quantum.
CRYPTOGRAPHY AND NP-HARDNESS Andrej Bogdanov Chinese University of Hong Kong MACS Foundations of Cryptography| January 2016.
Princeton University COS 433 Cryptography Spring 2010 Boaz Barak COS 433: Cryptography Princeton University Spring 2010 Boaz Barak Lecture 12: Idiot’s.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Great Theoretical Ideas in Computer Science.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Non-locality and quantum games Dmitry Kravchenko University of Latvia Theory days at Jõulumäe, 2008.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography Alok.T.J EC 11.
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 24 (2009) Richard.
Presentation transcript:

Princeton University COS 433 Cryptography Fall 2007 Boaz Barak COS 433: Cryptography Princeton University Fall 2007 Boaz Barak Lecture 12: Idiot’s Guide to Quantum Computing & Crypto Disclaimer

2 "Do not take the lecture too seriously... just relax and enjoy it. I am going to tell you what nature behaves like. If you will simply admit that maybe she does behave like this, you will find her a delightful, entrancing thing. Do not keep saying to yourself "But how can it be like that?" because you will get... into a blind alley from which nobody has yet escaped. Nobody knows how it can be like that." Richard Feynmann on Quantum Mechanics. Strange aspects of quantum mechanics:  Superposition – object doesn’t have definite properties (location, speed) but has probabilities over them.  Interference – probabilities can be negative.  Entanglement – properties of many particles can be correlated.  Measurement – object’s properties collapse to definite value when measured, collapsing also properties of other entangled objects.

3 Double-Slit Experiment If we place detector then pattern turns to be as expected. We can never catch an electron “red-handed” behaving bizarrely How does electron passing thru top slit know to avoid mid point if bottom slit is open?

4 Mathematical Formalism Consider object/system that can be in one of two states. State |1> - electron hit mid point State |0> - electron did not hit mid point. Deterministic view: System is either in state |0> or state |1> Probabilistic view: System is in state |0> w.prob p and state |1> w.prob q with p+q=1 Quantum view: System is in state p|0>+q|1> with |p|+|q|=1(p,q can be negative!) In fact, to make the math work nicely, assume: Fp,q can be arbitrary complex numbers. Fp 2 +q 2 =1 (prob of system measuring to |0> is p 2 =|p| 2 )b b

5 Mathematical Formalism Consider object/system that can be in one of two states. State |1> - electron hit mid point State |0> - electron did not hit mid point. Quantum view: System is in state p|0>+q|1> with |p| 2 +|q| 2 =1(p,q complex) Suppose system consists of two bits – has four possible states: |00>, |01>, |10>, |11> Quantum view: System is in state p 1 |00>+p 2 |01>+p 3 |10>+p 4 |11>where |p 1 | 2 +|p 2 | 2 +|p 3 | 2 +|p 4 | 2 =1 When measured, system will collapse to i th state w.prob |p i | 2. Note: Need 2 n numbers to keep track of state of n-bit system. bb1b1 b2b2

6 World View Democritos  Newton  Einstein: Underlying everything are small particles interacting locally using simple well-defined rules (“billiard balls”). Quantum Mechanics: Nature has a secret HUGE piece of paper containing > complex numbers, keeping track of a superposition of all particles in the world, but allows us only to make some specific measurements of these numbers. Measuring changes the state of the world. Suppose system consists of two bits – has four possible states: |00>, |01>, |10>, |11> Quantum view: System is in state p 1 |00>+p 2 |01>+p 3 |10>+p 4 |11>where |p 1 | 2 +|p 2 | 2 +|p 3 | 2 +|p 4 | 2 =1 When measured, system will collapse to i th state w.prob |p i | 2. Note: Need 2 n numbers to keep track of state of n-bit system. b1b1 b2b2

7 Bell’s Inequalities AliceBob Charlie x y a b Alice and Bob win if a © b = x ^ y (i.e., If a=b unless x=y=1 ) Can win w.p. ¾ by always sending a=b=0 Thm: Cannot do better without coordination: If a is function of x, private and shared randomness b is function of y, private and shared randomness Then Alice and Bob win with prob ∙ ¾ 19K miles (0.1 light seconds)

8 World View Democritos  Newton  Einstein: Underlying everything are small particles interacting locally using simple well-defined rules (“billiard balls”). Quantum Mechanics: Nature has a secret HUGE piece of paper containing > complex numbers, keeping track of a superposition of all particles in the world, but allows us only to make some specific measurements of these numbers. Measuring changes the state of the world. “Corollary”: We do not know how to simulate quantum system of n particles for t time units in time poly(n.t). Rephrase: There are some computations performed by quantum systems of n particles and t time units that we don’t know to perform in a classical computer in time poly(n,t) Maybe can use quantum system to solve hard computational problems??

9 Some Quotes The major problem is the requirement that basic quantum equations hold to multi-hundredth if not millionth decimal positions... Are quantum amplitudes still complex numbers to such accuracies or do they become quaternions, colored graphs, or sick-humored gremlins? Leonid Levin The only difference between a probabilistic classical world and the equations of the quantum world is that somehow or other it appears as if the probabilities would have to go negative.. Richard Feinmann (See Aaronson STOC’ 04 for scientific response)

10 Quantum Computation – State of the Art  There is a mathematical model for computing devices exploiting quantum mechanics – “quantum computers”.  Many technical difficulties (and maybe fundamental difficulties?) in building such machines.  (Unsurprisingly) there is no proof that quantum computers are more powerful than classical computers/Boolean circuits/Turing machines.  There are polynomial algorithms for quantum computers solving problems unknown to be solvable classically in poly-time: FSimulation of quantum system FFactoring integers and discrete logs.  There are hard problems with no quantum poly-time algorithms: FSAT, 3COL and all the NP-complete problems. FInverting many candidate one-way functions and permutations, private key encryption and signature schemes. FProblems on lattices (can be used for public-key encryption).

11 Quantum Computation And Cryptography  If quantum computers can be built, then many popular encryption and signature schemes can be broken (RSA,Diffie-Hellman)  However, there are still other candidates for encryption schemes not known to be broken. This is especially true for private key cryptography and signature schemes.  Many (but not all) of the proofs of security in crypto carry over from the classical model to the quantum model, as long as the underlying hard problem is assumed hard for quantum computers.  Exciting possibilities of using quantum mechanics to obtain perfectly unconditionally secure cryptography. Does not require full fledged quantum computers – prototype systems already being built. Quantum Key Distribution (QKD)

12 Quantum Key Distribution Consider system of two bits initialized to 1/ p 2 |00> + 1/ p 2 |11> |00>+|11> b1b1 b2b2 Give b 1 to Alice and b 2 to Bob. According to QM until Alice measures b 1, it is completely random, but once she measures it system collapses to either |00> or |11> Thus Bob will measure the same value as Alice. First idea for key exchange using QM: AliceEveBob b 1 b 2 = |00>+|11> Measure b 1 Measure b 2 Transfer qubit b 2

13 First idea for key exchange using QM: AliceEveBob b 1 b 2 = |00>+|11> Measure b 1 Measure b 2 Problem: What if Eve measures b 2 on the way and learns it? We can’t stop Eve from doing so, but we need a way for Bob to find out. Problem can be solved but we need:  Learn more about operations allowed in QM.  Assume Bob and Alice can exchange authenticated but not secret classical messages. Transfer qubit b 2

14 Unitary Operations Consider system of one bit. Classically, there are not many operations we can perform on it – keep it the same or invert it. b In QM, system’s state is described as p|0>+q|1> - i.e., vector (p,q) 2 C 2 According to QM, we can perform any operation A on system that is:  Linear: A(p+p’,q+q’) = A(p,q) + A(p’,q’)  Norm-preserving: If ||(p,q)||= p p 2 +q 2 =1 then ||A(p,q)||=1  Orthogonal: A(1,0)=A|0> is perpendicular to A(0,1)=A|1> Example: H|0> = 1/ p 2 |0> + 1/ p 2 |1> ~ |0> + |1> = (1,1) H|1> = 1/ p 2 |0> - 1/ p 2 |1> ~ |0> - |1> = (1,-1) H (p,q) ? (p’,q’) if pp’+qq’=0

15 Key exchange using QM: AliceEveBob b 1 b 2 = |00>+|11> Transfer qubit b 2 With prob ½, apply H to b 1 If “YES” apply H to b 2 “I received the bit” H|0> = 1/ p 2 |0> + 1/ p 2 |1> ~ |0> + |1> = (1,1) H|1> = 1/ p 2 |0> - 1/ p 2 |1> ~ |0> - |1> = (1,-1) H If applied H send “YES” Measure b 2 w.p. ½ send b 2 Measure b 1. If b 1  b 2 abort protocol. Lemma 1: If Eve did not measure b 2 then b 1 =b 2 with prob 1. Proof: If they did not apply H then clearly b 1 =b 2 If both Alice and Bob apply H we get that b 1 b 2 is transformed to HH|00>+|11>= (|0>+|1>)(|0>+|1>)+(|0>-|1>)(|0>-|1>) = |00>+|10>+|01>+|11>+|00>-|10>-|01>+|11>=|00>+|11>

16 H|0> = 1/ p 2 |0> + 1/ p 2 |1> ~ |0> + |1> = (1,1) H|1> = 1/ p 2 |0> - 1/ p 2 |1> ~ |0> - |1> = (1,-1) H Lemma 2: If Eve did measure b 2 then b 1  b 2 with prob ¸ 1/4. Proof: As example, assume that Eve measured b 2 and collapsed b 1 b 2 to |11> If both Alice and Bob apply H we get that b 1 b 2 is transformed to HH|11>= (|0>-|1>)(|0>-|1>) = |00>-|10>-|01>+|11> w.p. ½ this system collapses to either |10> or |01> and hence b 1  b 2 AliceEveBob b 1 b 2 = |00>+|11> Transfer qubit b 2 With prob ½, apply H to b 1 If “YES” apply H to b 2 “I received the bit” If applied H send “YES” Measure b 2 w.p. ½ send b 2 Measure b 1. If b 1  b 2 abort protocol. Key exchange using QM:

17 Lemma 2: If Eve did measure b 2 then b 1  b 2 with prob ¸ 1/4. Lemma 1: If Eve did not measure b 2 then b 1 =b 2 with prob 1. Idea: Continue this for 2n steps, and discard all bits that were made public. If did not abort, Alice and Bob can be almost certain Eve did not measure and has no information about undiscarded bits. Proof generalized to case that Eve applies arbitrary unitary transformation. AliceEveBob b 1 b 2 = |00>+|11> Transfer qubit b 2 With prob ½, apply H to b 1 If “YES” apply H to b 2 “I received the bit” If applied H send “YES” Measure b 2 w.p. ½ send b 2 Measure b 1. If b 1  b 2 abort protocol. Key exchange using QM: