Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Workshop on Post-Quantum Security Models Paris, France Tuesday,

Slides:



Advertisements
Similar presentations
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Advertisements

A Tight High-Order Entropic Quantum Uncertainty Relation with Applications Serge Fehr, Christian Schaffner (CWI Amsterdam, NL) Renato Renner (ETH Zürich,
Christian Schaffner CWI Amsterdam, Netherlands Position-Based Quantum Cryptography: Impossibility and Constructions Seminar Eindhoven, Netherlands Wednesday,
Position-Based Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic Tea, ILLC Tuesday, 14/02/2012.
Tight Bounds for Unconditional Authentication Protocols in the Moni Naor Gil Segev Adam Smith Weizmann Institute of Science Israel Modeland Shared KeyManual.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Quantum information as high-dimensional geometry Patrick Hayden McGill University Perspectives in High Dimensions, Cleveland, August 2010.
Short course on quantum computing Andris Ambainis University of Latvia.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Zero Knowledge Proofs By Subha Rajagopalan Jaisheela Kandagal.
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications Serge Fehr, Christian Schaffner (CWI Amsterdam, NL) Renato Renner (University.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Oblivious Transfer based on the McEliece Assumptions
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
Position Based Cryptography* Nishanth Chandran Vipul Goyal Ryan Moriarty Rafail Ostrovsky UCLA CRYPTO ‘09.
Interactive Proofs For Quantum Computations Dorit Aharonov, Michael Ben-Or, Elad Eban School of Computer Science and Engineering The Hebrew University.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Institute of Technical Physics Entanglement – Beamen – Quantum cryptography The weird quantum world Bernd Hüttner CPhys FInstP DLR Stuttgart.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Position-Based Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Advances in Quantum Cryptography Workshop.
Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Bachelor.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Amsterdam.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009.
Practical Aspects of Quantum Coin Flipping Anna Pappa Presentation at ACAC 2012.
Introduction to Quantum Key Distribution
Christian Schaffner, PhD student NF-årsfest 2005 A A R H U S U N I V E R S I T E T DAIMI – Department of Computer Science BRICS – Basic Research in Computer.
Entanglement sampling and applications Omar Fawzi (ETH Zürich) Joint work with Frédéric Dupuis (Aarhus University) and Stephanie Wehner (CQT, Singapore)
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Lecture 2: Introduction to Cryptography
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Overview of Cryptography & Its Applications
Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September.
Nawaf M Albadia
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Tropical QKD Waterloo, ON, Canada Wednesday, 16 June 2010.
Cryptography In the Bounded Quantum-Storage Model
Feasibility and Completeness of Cryptographic Tasks in the Quantum World Hong-Sheng Zhou (U. Maryland) Joint work with Jonathan Katz (U. Maryland) Fang.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Cryptography Christian Schaffner
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Formal Verification of Quantum Cryptography Dominique Unruh University of Tartu.
Quantum Cryptography Christian Schaffner
Quantum Cryptography Antonio Acín
Position Based Cryptography Nishanth Chandran Vipul Goyal Ryan Moriarty Rafail Ostrovsky UCLA.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
INCS 741: Cryptography Overview and Basic Concepts.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Cryptography in the Bounded-Quantum-Storage Model Christian Schaffner BRICS, University of Aarhus PhD Defense Friday, April 27 th 2007.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Topic 36: Zero-Knowledge Proofs
Entropic uncertainty relations for anti-commuting observables
Quantum Cryptography Christian Schaffner ICT OPEN 2017
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Position Based Cryptography*
Presentation transcript:

Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Workshop on Post-Quantum Security Models Paris, France Tuesday, 12 October 2010

2 Outline  Cryptographic Primitives  Noisy-Storage Model  Position-Based Quantum Cryptography  Conclusion

3 Cryptography settings where parties do not trust each other: secure communication authentication Alice Bob Eve three-party scenario = ? use the same quantum hardware for applications in two- and multi-party scenarios

4 Example: ATM PIN-based identification scheme should be a secure evaluation of the equality function dishonest player can exclude only one possible password = = a a = b ? ? b ?

5 Modern Cryptography two-party scenarios: password-based identification (=) millionaire‘s problem (<) dating problem (AND) multi-party scenarios: sealed-bid auctions e-voting … use QKD hardware for applications in two- and multi-party scenarios

6 In the plain model (no restrictions on adversaries, using quantum communication, as in QKD): Secure function evaluation is impossible (Lo ‘97) Restrict the adversary: Computational assumptions (e.g. factoring or discrete logarithms are hard) Can we implement these primitives?

7 use the technical difficulties in building a quantum computer to our advantage storing quantum information is a technical challenge Bounded-Quantum-Storage Model : bound the number of qubits an adversary can store (Damgaard, Fehr, Salvail, S ‘05) Noisy-(Quantum-)Storage Model: more general and realistic model (Wehner, S, Terhal ’07; König, Wehner, Wullschleger ‘09) Exploit Quantum-Storage Imperfections Conversion can failError in storageReadout can fail

8 Outline Cryptographic Primitives  Noisy-Storage Model  Position-Based Quantum Cryptography  Conclusion

9 The Noisy-Storage Model (Wehner, S, Terhal ’07)

10 what an (active) adversary can do:  change messages  computationally all-powerful  actions are ‘instantaneous’  unlimited classical storage restriction:  noisy quantum storage The Noisy-Storage Model (Wehner, S, Terhal ’07) waiting time: ¢ t

11 The Noisy-Storage Model (Wehner, S, Terhal ’07) Arbitrary encoding attack Arbitrary encoding attack Unlimited classical storage  change messages  computationally all-powerful  unlimited classical storage  actions are ‘instantaneous’  change messages  computationally all-powerful  unlimited classical storage  actions are ‘instantaneous’ waiting time: ¢ t Adversary’s state Noisy quantum storage models:  transfer into storage (photonic states onto different carrier)  decoherence in memory

12 General case [ König Wehner Wullschleger 09] : Storage channels with “strong converse” property, e.g. depolarizing channel Some simplifications [S 10] Protocol Structure 12 weak string erasure waiting time: ¢ t quantum part as in BB84  Noisy quantum storage  Noisy quantum storage oblivious transfer secure identification bit commitment classical post-processing

13 Summary = = defined the noisy-storage model exactly specified capabilities of adversary protocol structure quantum: BB84 classical post-processing resulting in security proofs: entropic uncertainty relations quantum channel properties quantum information theory  change messages  computationally all-powerful  unlimited classical storage  actions are ‘instantaneous’  change messages  computationally all-powerful  unlimited classical storage  actions are ‘instantaneous’ < < AND

14 Outline Cryptographic Primitives Noisy-Storage Model  Position-Based Quantum Cryptography  Conclusion

15 Example: Position Verification Prover wants to convince verifiers that she is at a particular position assumptions: communication at speed of light instantaneous computation verifiers can coordinate no coalition of (fake) provers, i.e. not at the claimed position, can convince verifiers Verifier1 Verifier2 Prover

16 Position Verification: First Try Verifier1 Verifier2 Prover time

17 Position Verification: Second Try Verifier1 Verifier2 Prover position verification is classically impossible ! even using computational assumptions [Chandran Goyal Moriarty Ostrovsky: CRYPTO ‘09]

18 Verifier1 Verifier2 Prover Position-Based Quantum Cryptography [Kent Munro Spiller 03/10, Chandran Fehr Gelles Goyal Ostrovsky, Malaney 10] intuitively: security follows from no cloning formally, usage of recently established [Renes Boileau 09] strong complementary information trade-off

19 Position-Based QC: Teleportation Attack [Kent Munro Spiller 03/10, Lau Lo 10]

20 Position Verification: Fourth Try [Kent Munro Spiller 03/10, Malaney 10, Lau Lo 10] exercise: insecure if adversaries share 2 EPR pairs!

21 Impossibility of Position-Based Q Crypto [ Buhrman Chandran Fehr Gelles Goyal Ostrovsky S 10] general attack clever way of back-and-forth teleportation, based on ideas by [Vaidman 03] for “instantaneous measurement of nonlocal variables”

22 Position-Based Quantum Cryptography can be generalized to more dimensions plain model: classically and quantumly impossible basic scheme for secure positioning if adversaries have no pre-shared entanglement more advanced schemes allow message authentication and key distribution Verifier1 Verifier2Prover [Buhrman Chandran Fehr Gelles Goyal Ostrovsky S 10]

23 Open Questions no-go theorem vs. secure schemes how much entanglement is required to break the scheme? security in the bounded-entanglement model? interesting connections to entropic uncertainty relations and non-local games Verifier1 Verifier2Prover [Buhrman Chandran Fehr Gelles Goyal Ostrovsky S 10]

24 Conclusion = = cryptographic primitives noisy-storage model: well-defined adversary model position-based q cryptography general no-go theorem security if no entanglement QKD hardware and know-how is useful in applications beyond key distribution