Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Tropical QKD Waterloo, ON, Canada Wednesday, 16 June 2010.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Advertisements

A Tight High-Order Entropic Quantum Uncertainty Relation with Applications Serge Fehr, Christian Schaffner (CWI Amsterdam, NL) Renato Renner (ETH Zürich,
Foundations of Cryptography Lecture 7 Lecturer:Danny Harnik.
Christian Schaffner CWI Amsterdam, Netherlands Position-Based Quantum Cryptography: Impossibility and Constructions Seminar Eindhoven, Netherlands Wednesday,
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
Position-Based Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic Tea, ILLC Tuesday, 14/02/2012.
Key Exchange Using Passwords and Long Keys Vladimir Kolesnikov Charles Rackoff Comp. Sci. University of Toronto.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Short course on quantum computing Andris Ambainis University of Latvia.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Zero Knowledge Proofs By Subha Rajagopalan Jaisheela Kandagal.
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications Serge Fehr, Christian Schaffner (CWI Amsterdam, NL) Renato Renner (University.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Oblivious Transfer based on the McEliece Assumptions
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
Position Based Cryptography* Nishanth Chandran Vipul Goyal Ryan Moriarty Rafail Ostrovsky UCLA CRYPTO ‘09.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Position-Based Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Advances in Quantum Cryptography Workshop.
Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Bachelor.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Workshop on Post-Quantum Security Models Paris, France Tuesday,
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Amsterdam.
Practical Aspects of Quantum Coin Flipping Anna Pappa Presentation at ACAC 2012.
1 Lect. 20. Identification. 2  Entity Authentication (Identification) Over the communication network, one party, Alice, shows to another party, Bob,
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
Christian Schaffner, PhD student NF-årsfest 2005 A A R H U S U N I V E R S I T E T DAIMI – Department of Computer Science BRICS – Basic Research in Computer.
Entanglement sampling and applications Omar Fawzi (ETH Zürich) Joint work with Frédéric Dupuis (Aarhus University) and Stephanie Wehner (CQT, Singapore)
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Rational Cryptography Some Recent Results Jonathan Katz University of Maryland.
Lecture 2: Introduction to Cryptography
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September.
Nawaf M Albadia
Cryptography In the Bounded Quantum-Storage Model
Feasibility and Completeness of Cryptographic Tasks in the Quantum World Hong-Sheng Zhou (U. Maryland) Joint work with Jonathan Katz (U. Maryland) Fang.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Cryptography Christian Schaffner
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Formal Verification of Quantum Cryptography Dominique Unruh University of Tartu.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Christian Schaffner
Quantum Cryptography Antonio Acín
Position Based Cryptography Nishanth Chandran Vipul Goyal Ryan Moriarty Rafail Ostrovsky UCLA.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
INCS 741: Cryptography Overview and Basic Concepts.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
Modeling security 1. Models - encryption r Alice and Bob have the same key k r Alice and Bob exchange encrypted messages r Eve wants to get the plaintext.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
Cryptography in the Bounded-Quantum-Storage Model Christian Schaffner BRICS, University of Aarhus PhD Defense Friday, April 27 th 2007.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Topic 36: Zero-Knowledge Proofs
Quantum Cryptography Christian Schaffner ICT OPEN 2017
CV Cryptography Using a Bidirectional Quantum Channel
Quantum Cryptography Scott Roberts CSE /01/2001.
Presentation transcript:

Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Tropical QKD Waterloo, ON, Canada Wednesday, 16 June 2010

2 Outline  Cryptographic Primitives  Noisy-Storage Model  Position-Based Quantum Cryptography  Conclusion

3 Cryptography settings where parties do not trust each other: secure communication authentication Alice Bob Eve three-party scenario = ? use the same quantum hardware for applications in two- and multi-party scenarios

4 I’m Alice, my PIN is 4049 I want $50 Alright Alice, here you go. (example stolen from Louis Salvail) Modern-Day Cryptography

5 I’m Alice my PIN is 4049 I want $50 Sorry, I’m out of order Alice: 4049

6 Modern-Day Cryptography Alright Alice, here you go. Alice: 4049 I’m Alice, my PIN is 4049 I want $

7 Where It Went Wrong I’m Alice my PIN is 4049 I want $50

8 = = Secure Evaluation of the Equality PIN-based identification scheme should be a secure evaluation of the equality function dishonest player can exclude only one possible password a a = b ? ? b ?

9 IDEAL REAL f f Secure Function Evaluation: Definition we have: protocol x y f(x,y) we want: ideal functionality security: if REAL looks like IDEAL to the outside world f(x,y)

10 f f we have: protocol x f(x,y) y we want: ideal functionality security: if REAL looks like IDEAL to the outside world IDEAL REAL Secure Function Evaluation: Dishonest Alice

11 f f Secure Function Evaluation: Dishonest Bob we have: protocol x f(x,y) y we want: ideal functionality security: if REAL looks like IDEAL to the outside world IDEAL REAL

12 Modern Cryptography two-party scenarios: password-based identification (=) millionaire‘s problem (<) dating problem (AND) multi-party scenarios: sealed-bid auctions e-voting … use QKD hardware for applications in two- and multi-party scenarios

13 In the plain model (no restrictions on adversaries, using quantum communication, as in QKD): Secure function evaluation is impossible (Lo ‘97) Restrict the adversary: Computational assumptions (e.g. factoring or discrete logarithms are hard) Can we implement these primitives?

14 use the technical difficulties in building a quantum computer to our advantage storing quantum information is a technical challenge Bounded-Quantum-Storage Model : bound the number of qubits an adversary can store (Damgaard, Fehr, Salvail, S ‘05) Noisy-(Quantum-)Storage Model: more general and realistic model (Wehner, S, Terhal ’07; König, Wehner, Wullschleger ‘09) Exploit Quantum-Storage Imperfections Conversion can failError in storageReadout can fail

15 Outline Cryptographic Primitives  Noisy-Storage Model  Position-Based Quantum Cryptography  Conclusion

16 The Noisy-Storage Model (Wehner, S, Terhal ’07)

17 what an (active) adversary can do:  change messages  computationally all-powerful  unlimited classical storage  actions are ‘instantaneous’ restriction:  noisy quantum storage The Noisy-Storage Model (Wehner, S, Terhal ’07) waiting time: ¢ t

18 The Noisy-Storage Model (Wehner, S, Terhal ’07) Arbitrary encoding attack Arbitrary encoding attack Unlimited classical storage  change messages  computationally all-powerful  unlimited classical storage  actions are ‘instantaneous’  change messages  computationally all-powerful  unlimited classical storage  actions are ‘instantaneous’ waiting time: ¢ t Adversary’s state Noisy quantum storage models:  decoherence in memory  transfer into storage (photonic states onto different carrier)

19 natural conditions on the storage channel: waiting does not help: The Noisy-Storage Model Arbitrary encoding attack Arbitrary encoding attack Noisy quantum storage Unlimited classical storage Adversary’s state during waiting time: ¢ t

20 General case [ König Wehner Wullschleger arxiv: ] : Storage channels with “strong converse” property, e.g. depolarizing channel Some simplifications [S arxiv: ] Protocol Structure 20 weak string erasure waiting time: ¢ t quantum part as in BB84  Noisy quantum storage  Noisy quantum storage

21 Outline Cryptographic Primitives Noisy-Storage Model  Position-Based Quantum Cryptography  Conclusion

22 Position-Based Quantum Cryptography Prover wants to convince verifiers that she is at a particular position assumptions: communication at speed of light instantaneous computation verifiers can coordinate no coalition of (fake) provers, i.e. not at the claimed position, can convince verifiers Verifier1 Verifier2 Prover [Malaney: , Chandran Fehr Gelles Goyal Ostrovsky: ] classically impossible ! even using computational assumptions

23 Position-Based Quantum Cryptography intuitively: security follows from no cloning formally, usage of recently established strong complementary information trade-off Verifier1 Verifier2 Prover [Chandran Fehr Gelles Goyal Ostrovsky: ]

24 Position-Based Quantum Cryptography can be generalized to more dimensions basic scheme for secure positioning more advanced schemes allow message authentication and key distribution connections to entropic uncertainty relations and non-local games many open questions Verifier1 Verifier2Prover [Chandran Fehr Gelles Goyal Ostrovsky: ]

25 Conclusion = = cryptographic primitives noisy-storage model: well-defined adversary model composable security definitions position-based q cryptography QKD hardware and know-how is useful in applications beyond key distribution