Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 12: Idiot’s Guide.

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

Limitations of Quantum Advice and One-Way Communication Scott Aaronson UC Berkeley IAS Useful?
Quantum Computation and Quantum Information – Lecture 2
Use of Time as a Quantum Key By Caleb Parks and Dr. Khalil Dajani.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Foundations of Cryptography Lecture 4 Lecturer: Moni Naor.
Quantum Computing MAS 725 Hartmut Klauck NTU
Great Theoretical Ideas in Computer Science.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Public Key Algorithms …….. RAIT M. Chatterjee.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Princeton University COS 433 Cryptography Fall 2007 Boaz Barak COS 433: Cryptography Princeton University Fall 2007 Boaz Barak Lecture 12: Idiot’s Guide.
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Princeton University COS 433 Cryptography Fall 2007 Boaz Barak COS 433: Cryptography Princeton University Fall 2007 Boaz Barak Lecture 12: Idiot’s Guide.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
CSE 321 Discrete Structures Winter 2008 Lecture 8 Number Theory: Modular Arithmetic.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
Quantum Computers Todd A. Brun Communication Sciences Institute USC.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Quantum Computation and Quantum Information – Lecture 2 Part 1 of CS406 – Research Directions in Computing Dr. Rajagopal Nagarajan Assistant: Nick Papanikolaou.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
Quantum Public Key Cryptography with Information- Theoretic Security Daniel Gottesman Perimeter Institute.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Lecture 6: Public Key Cryptography
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Presented by: Erik Cox, Shannon Hintzman, Mike Miller, Jacquie Otto, Adam Serdar, Lacie Zimmerman.
Dominique Unruh 3 September 2012 Quantum Cryptography Dominique Unruh.
Cryptography Lecture 8 Stefan Dziembowski
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Great Theoretical Ideas in Computer Science.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Cryptography Lecture 9 Stefan Dziembowski
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Michele Mosca Canada Research Chair in Quantum Computation 27 May 2006 Introduction to quantum technologies: quantum computers, quantum teleporters & cryptography.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Wednesday, October 31 Ford Final Chapter (10). Agenda Announce: –Test Wednesday –Office Hours probably busy…better book appt. –Read Chs. 1-3 of Vilekin.
Quantum Mechanics1 Schrodinger’s Cat. Quantum Mechanics2 A particular quantum state, completely described by enough quantum numbers, is called a state.
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Quantum Computing Michael Larson. The Quantum Computer Quantum computers, like all computers, are machines that perform calculations upon data. Quantum.
CRYPTOGRAPHY AND NP-HARDNESS Andrej Bogdanov Chinese University of Hong Kong MACS Foundations of Cryptography| January 2016.
Princeton University COS 433 Cryptography Spring 2010 Boaz Barak COS 433: Cryptography Princeton University Spring 2010 Boaz Barak Lecture 12: Idiot’s.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Christian Schaffner
Quantum Cryptography Antonio Acín
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Cryptography CS Lecture 19 Prof. Amit Sahai.
Great Theoretical Ideas in Computer Science.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
COMPSCI 290.2: Computer Security
Quantum Cryptography Alok.T.J EC 11.
Presentation transcript:

Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 12: Idiot’s Guide to Quantum Computing & Crypto Disclaimer

2 "Do not take the lecture too seriously... just relax and enjoy it. I am going to tell you what nature behaves like. If you will simply admit that maybe she does behave like this, you will find her a delightful, entrancing thing. Do not keep saying to yourself "But how can it be like that?" because you will get... into a blind alley from which nobody has yet escaped. Nobody knows how it can be like that." Richard Feynmann on Quantum Mechanics. Strange aspects of quantum mechanics:  Superposition – object doesn’t have definite properties (location, speed) but has probabilities over them.  Interference – probabilities can be negative.  Entanglement – properties of many particles can be correlated.  Measurement – object’s properties collapse to definite value when measured, collapsing also properties of other entangled objects.

3 Double-Slit Experiment If we place detector then pattern turns to be as expected. We can never catch an electron “red-handed” behaving bizarrely How does electron passing thru top slit know to avoid mid point if bottom slit is open?

4 Mathematical Formalism Consider object/system that can be in one of two states. State |1> - electron hit mid point State |0> - electron did not hit mid point. Deterministic view: System is either in state |0> or state |1> Probabilistic view: System is in state |0> w.prob p and state |1> w.prob q with p+q=1 Quantum view: System is in state p|0>+q|1> with |p|+|q|=1(p,q can be negative!) In fact, to make the math work nicely, assume: Fp,q can be arbitrary complex numbers. Fp 2 +q 2 =1 (prob of system measuring to |0> is p 2 =|p| 2 )b b

5 Mathematical Formalism Consider object/system that can be in one of two states. State |1> - electron hit mid point State |0> - electron did not hit mid point. Quantum view: System is in state p|0>+q|1> with |p| 2 +|q| 2 =1(p,q complex) Suppose system consists of two bits – has four possible states: |00>, |01>, |10>, |11> Quantum view: System is in state p 1 |00>+p 2 |01>+p 3 |10>+p 4 |11>where |p 1 | 2 +|p 2 | 2 +|p 3 | 2 +|p 4 | 2 =1 When measured, system will collapse to i th state w.prob |p i | 2. Note: Need 2 n numbers to keep track of state of n-bit system. bb1b1 b2b2

6 World View Democritos  Newton  Einstein: Underlying everything are small particles interacting locally using simple well-defined rules (“billiard balls”). Quantum Mechanics: Nature has a secret HUGE piece of paper containing > complex numbers, keeping track of a superposition of all particles in the world, but allows us only to make some specific measurements of these numbers. “Corollary”: We do not know how to simulate quantum system of n particles for t time units in time poly(n.t). Rephrase: There are some computations performed by quantum systems of n particles and t time units that we don’t know to perform in a classical computer in time poly(n,t) Maybe can use quantum system to solve hard computational problems??

7 Quantum Computation – State of the Art  There is a mathematical model for computing devices exploiting quantum mechanics – “quantum computers”.  Many technical difficulties (and maybe fundamental difficulties?) in building such machines.  (Unsurprisingly) there is no proof that quantum computers are more powerful than classical computers/Boolean circuits/Turing machines.  There are polynomial algorithms for quantum computers solving problems unknown to be solvable classically in poly-time: FSimulation of quantum system FFactoring integers and discrete logs.  There are hard problems with no quantum poly-time algorithms: FSAT, 3COL and all the NP-complete problems. FInverting many candidate one-way functions and permutations, private key encryption and signature schemes. FProblems on lattices (can be used for public-key encryption).

8 Quantum Computation And Cryptography  If quantum computers can be built, then many popular encryption and signature schemes can be broken (RSA,Diffie-Hellman)  However, there are still other candidates for encryption schemes not known to be broken. This is especially true for private key cryptography and signature schemes.  Many (but not all) of the proofs of security in crypto carry over from the classical model to the quantum model, as long as the underlying hard problem is assumed hard for quantum computers.  Exciting possibilities of using quantum mechanics to obtain perfectly unconditionally secure cryptography. Does not require full fledged quantum computers – prototype systems already being built. Quantum Key Distribution (QKD)

9 Quantum Key Distribution Consider system of two bits initialized to 1/ p 2 |00> + 1/ p 2 |11> |00>+|11> b1b1 b2b2 Give b 1 to Alice and b 2 to Bob. According to QM until Alice measures b 1, it is completely random, but once she measures it system collapses to either |00> or |11> Thus Bob will measure the same value as Alice. First idea for key exchange using QM: AliceEveBob b 1 b 2 = |00>+|11> Measure b 1 Measure b 2 Transfer qubit b 2

10 First idea for key exchange using QM: AliceEveBob b 1 b 2 = |00>+|11> Measure b 1 Measure b 2 Problem: What if Eve measures b 2 on the way and learns it? We can’t stop Eve from doing so, but we need a way for Bob to find out. Problem can be solved but we need:  Learn more about operations allowed in QM.  Assume Bob and Alice can exchange authenticated but not secret classical messages. Transfer qubit b 2

11 Unitary Operations Consider system of one bit. Classically, there are not many operations we can perform on it – keep it the same or invert it. b In QM, system’s state is described as p|0>+q|1> - i.e., vector (p,q) 2 C 2 According to QM, we can perform any operation A on system that is:  Linear: A(p+p’,q+q’) = A(p,q) + A(p’,q’)  Norm-preserving: If ||(p,q)||= p p 2 +q 2 =1 then ||A(p,q)||=1  Orthogonal: A(1,0)=A|0> is perpendicular to A(0,1)=A|1> Example: H|0> = 1/ p 2 |0> + 1/ p 2 |1> ~ |0> + |1> = (1,1) H|1> = 1/ p 2 |0> - 1/ p 2 |1> ~ |0> - |1> = (1,-1) H (p,q) ? (p’,q’) if pp’+qq’=0

12 Key exchange using QM: AliceEveBob b 1 b 2 = |00>+|11> Transfer qubit b 2 With prob ½, apply H to b 1 If “YES” apply H to b 2 “I received the bit” H|0> = 1/ p 2 |0> + 1/ p 2 |1> ~ |0> + |1> = (1,1) H|1> = 1/ p 2 |0> - 1/ p 2 |1> ~ |0> - |1> = (1,-1) H If applied H send “YES” Measure b 2 w.p. ½ send b 2 Measure b 1. If b 1  b 2 abort protocol. Lemma 1: If Eve did not measure b 2 then b 1 =b 2 with prob 1. Proof: If they did not apply H then clearly b 1 =b 2 If both Alice and Bob apply H we get that b 1 b 2 is transformed to HH|00>+|11>= (|0>+|1>)(|0>+|1>)+(|0>-|1>)(|0>-|1>) = |00>+|10>+|01>+|11>+|00>-|10>-|01>+|11>=|00>+|11>

13 H|0> = 1/ p 2 |0> + 1/ p 2 |1> ~ |0> + |1> = (1,1) H|1> = 1/ p 2 |0> - 1/ p 2 |1> ~ |0> - |1> = (1,-1) H Lemma 2: If Eve did measure b 2 then b 1  b 2 with prob ¸ 1/4. Proof: As example, assume that Eve measured b 2 and collapsed b 1 b 2 to |11> If both Alice and Bob apply H we get that b 1 b 2 is transformed to HH|11>= (|0>-|1>)(|0>-|1>) = |00>-|10>-|01>+|11> w.p. ½ this system collapses to either |10> or |01> and hence b 1  b 2 AliceEveBob b 1 b 2 = |00>+|11> Transfer qubit b 2 With prob ½, apply H to b 1 If “YES” apply H to b 2 “I received the bit” If applied H send “YES” Measure b 2 w.p. ½ send b 2 Measure b 1. If b 1  b 2 abort protocol. Key exchange using QM:

14 Lemma 2: If Eve did measure b 2 then b 1  b 2 with prob ¸ 1/4. Lemma 1: If Eve did not measure b 2 then b 1 =b 2 with prob 1. Idea: Continue this for 2n steps, and discard all bits that were made public. If did not abort, Alice and Bob can be almost certain Eve did not measure and has no information about undiscarded bits. Proof generalized to case that Eve applies arbitrary unitary transformation. AliceEveBob b 1 b 2 = |00>+|11> Transfer qubit b 2 With prob ½, apply H to b 1 If “YES” apply H to b 2 “I received the bit” If applied H send “YES” Measure b 2 w.p. ½ send b 2 Measure b 1. If b 1  b 2 abort protocol. Key exchange using QM: