A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

Quantum Computation and Quantum Information – Lecture 2
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Quantum Computing MAS 725 Hartmut Klauck NTU
Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Quantum data locking, enigma machines and entropic uncertainty relations Saikat Guha, Patrick Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro,
1 quantum teleportation David Riethmiller 28 May 2007.
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 / RAC 2211 Lecture.
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
Quantum information as high-dimensional geometry Patrick Hayden McGill University Perspectives in High Dimensions, Cleveland, August 2010.
Short course on quantum computing Andris Ambainis University of Latvia.
Quantum Computing MAS 725 Hartmut Klauck NTU
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Ref. Cryptography: theory and practice Douglas R. Stinson
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
Quantum Cryptography Marshall Roth March 9, 2007.
Efficient many-party controlled teleportation of multi-qubit quantum information via entanglement Chui-Ping Yang, Shih-I Chu, Siyuan Han Physical Review.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
Introduction to Quantum Information Processing Lecture 4 Michele Mosca.
CSEP 590tv: Quantum Computing
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Foundations of Cryptography Lecture 9 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
1 Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871 Richard Cleve QNC 3129 Lecture 18 (2014)
How to play ANY mental game
Alice and Bob’s Excellent Adventure
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 16 (2011)
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Channel Capacity.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
Borsós, K.; Benedict, M. G. University of Szeged, Szeged, Hungary Animation of experiments in modern quantum physics Animation of experiments in modern.
1 Information Theory Nathanael Paul Oct. 09, 2002.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Bell Measurements and Teleportation. Overview Entanglement Bell states and Bell measurements Limitations on Bell measurements using linear devices Teleportation.
Alternative Wide Block Encryption For Discussion Only.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Coherent Communication of Classical Messages Aram Harrow (MIT) quant-ph/
1 Modeling Quantum Information Systems Paul E. Black National Institute of Standards and Technology Andrew W. Lane University of Kentucky.
Cryptography In the Bounded Quantum-Storage Model
Coherent Classical Communication Aram Harrow, MIT Quantum Computing Graduate Research Fellow Objective Objective ApproachStatus Determine.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography Antonio Acín
Coherent Communication of Classical Messages Aram Harrow (MIT) quant-ph/
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Key Distribution
Cryptography Lecture 4.
Topic 3: Perfect Secrecy
Quantum Information Theory Introduction
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 22 (2009) Richard.
Presentation transcript:

A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University

QKD: An “Application” of Non- Cloning First, a digression: Wiesner’s unforgeable quantum cash x++xx+xx++x x++x+x++x+x+xx xx+xx+x+++x x+xxx++x+x+++x x++xx+x+x+xx x+xx++x+x++x xx+x++x+x+++x x+x+++xx+x++x x+++xx+x+x+++x nd attack: 1st attack: pick random bases, measure and store the outcome

BB Quantum Channel quantum classical OK 1,3,5,6,7-----((1,0),(7,1)) OK,f Verify that not 2-many errors occured. If OK then choose f randomly from U2 class. K=f(110) Return good positions and a random sample. error-correction 0*1*101*0*1*101* 0*1*101*0*1*101*

Hardware This is how a QKD set-up looked like a few years ago. photodetector: photon source And now:

Purified BB84 This EPR pair is a singlet:

Encrypting Qubits Suppose we want to encrypt a qubit under a classical secret-key K, such that: The cipher state alone does not reveal any information on the state of the qubit. Using K, the qubit can be perfectly reconstructed from the cipher state.

Encryption/Decryptio n We suppose that encryption is performed by a family of unitary transforms {U K } K indexed by secret-key K. The simplest form is that upon qubit |φ>, the cipher state is generated as: |e K (φ)> = U K |φ>. Decryption is performed by running U K backward (its complex conjugate transposed).

Privacy Privacy means that given only the cipher state |e K (φ)>, no information can be extracted about the state |φ>. This can be captured by enforcing that the quantum state produced by an encryption under a uniform and random choice for K is independent of |φ>. This would mean that an eavesdropper ignorant of K always sees the same state. No measurement can therefore distinguish the encryptions of any 2 states.

The State Available to the Eavesdropper As we have seen, the state available to the adversary when |φ> is encrypted is the mixed state corresponding to the encryption of |φ> over all keys: An encryption scheme is therefore said to be private if:

Back to Teleportation (x,z) with prob. 1/4:(0,0) with prob. 1/4:(0,1)with prob. 1/4:(1,0) with prob. 1/4:(1,1)

Encryption/Decryptio n Suppose Alice and Bob share K ∈ {0,1}×{0,1}: If K=(0,0) If K=(0,1) If K=(1,0) If K=(1,1) Since XX=ZZ=-YY=I, Bob decrypts by applying the same transform indicated by K:

In General It can be shown that 2 classical bits are necessary in order to encrypt with perfect privacy (and with perfect decryption) an arbitrary qubit. If the possible states of the qubit are restricted to some special sets then 1 classical could be sufficient. For the encryption of qubits with only statistical privacy and almost perfect descryption, a single classical bit per qubit is asymptotically sufficient.

First Special Case Suppose the possible states of the qubit are { |0>, |1> }. The situation is now classical and the one-time-pad (one bit per qubit) provides perfect privacy. Notice that the encryption of these 2 states using X with probability 1/2 is exactly the same as the one-time-pad.

Second Special Case Suppose the qubit to encrypt is of the form |φ> = a|0> + b|1> where a, b are real numbers. Now, observe that: So, only complex amplitude states require 2 bits of key.

Committing a Qubit Teleportation also allows to see how one can commit on a qubit given only a classical commitment scheme. Suppose the scheme allows for committing on a pair of classical bits. Encrypt |φ> using a random key K. classical commitment of K

Encrypting Classical Messages in Quantum States Consider the symmetric encryption of classical messages in quantum states. We’ll get a simple encryption scheme that resists “better” to known plaintext attacks than any classical scheme. It is based upon what is called an uncertainty relations.

Hadamard Transform Remember that: Let’s define the following 2 Von Neumann measurements on n qubits (computational & diagonal basis): Associated to |φ>, we can define the 2 probability distributions for the outcomes of M + and M x when applied to |φ>:

Uncertainty Relation The following uncertainty relation has been shown by Maassen and Uffink. We shall denote by H(p φ ) and H(q φ ) the Shannon entropy for distributions p φ (x) and q φ (x) respectively. Theorem: For any n-qubit state |φ>, it is the case that H(p φ ) + H(q φ ) ≥ n.

An equivalent uncertainty relation Suppose that a source S sends a quantum state chosen as follows: Pick x in {0,1} n at random, With prob. 1/2 send |x>, With prob. 1/2 send H ⊗ n |x>. Theorem: Let X be the random variable describing the choice made by S above. Let Y be the random variable for the outcome of an arbitrary measurement applied to the state sent by S. Then, for any outcome y: H(X|Y=y) ≥ n/2.

Encryption Scheme The key K=(p,h) where p ∈ {0,1} n and h ∈ {0,1}. The encryption of message m is done the following way: c := m ⊕ p If h=0 then send |c> Else send H ⊗ n |c>. Notice that the scheme is private since the message m is one-time-padded. This is a (n,n+1)-encryption scheme: it encrypts n-bit messages using n+1 bit of keys. This is called the H n -cipher

Known Plaintext Attacks In a known plaintext attack, the adversary gets the ciphertext(cipherstate), the plaintext and wants to extract as much information as possible on the secret-key. Theorem: Any classical (n,n+1)-cipher is such that H(K| c,m) ≤1. Theorem: The (n,n+1)-quantum cipher H n is such that H((p,h) | (H ⊗ n ) h | |m ⊕ p>,m)≥ n/2. Proof sketch: Given m and the situation is equivalent to distinguishing among {|p>,H ⊗ n |p>} p ∈ {0,1} n. We have seen that the entropy on p is at least n/2. In addition, it can be shown that the extra bit of key h is perfectly hidden. It follows that: H((p,h) | View) ≥ n/2+1.

Secure Evaluation of an AND gate AND x ∈ {0,1}y ∈ {0,1} ab a ⊕ b = xy Theorem: Even with shared randomness, Alice and Bob cannot implement the AND gate without communication such that with probability better 3/4 Alice and Bob end up with a correct output for all possible inputs.

Quantum Crypto-AND gate xy B1(0) B1(1) A0(0) A0(1) A1(0) A1(1) B0(0) B0(1 ) The interpretation: Given x, Alice measures her half EPR-pair in basis {Ax(0),Ax(1)}, Given y, Bob measures his half EPR-pair in basis {By(0),By(1)}.

Why it Works Let p(x,y) be the error-probability when Alice inputs x and Bob inputs y:

Conclusion With shared-EPR pairs, Alice and Bob can end up with an additive sharing for the AND of their bits without communication and with probability cos 2 (π/8)≈0.85. This is significantly better than what is achievable by any classical strategy using shared randomness. Quantum entanglement is therefore more than classical shared randomness!! This was originally shown by Bell using a different method called the Bell inequalities.