Feb 18 th, 2014 IQI Seminar, Caltech Kai-Min Chung IIS, Sinica,Taiwan Yaoyun Shi University of Michigan Xiaodi Wu MIT/UC Berkeley device ……. Ext(x,s i.

Slides:



Advertisements
Similar presentations
Dov Gordon & Jonathan Katz University of Maryland.
Advertisements

Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Quantum Software Copy-Protection Scott Aaronson (MIT) |
The Future (and Past) of Quantum Lower Bounds by Polynomials Scott Aaronson UC Berkeley.
New Evidence That Quantum Mechanics Is Hard to Simulate on Classical Computers Scott Aaronson Parts based on joint work with Alex Arkhipov.
On allocations that maximize fairness Uriel Feige Microsoft Research and Weizmann Institute.
An Introduction to Randomness Extractors Ronen Shaltiel University of Haifa Daddy, how do computers get random bits?
Extracting Randomness From Few Independent Sources Boaz Barak, IAS Russell Impagliazzo, UCSD Avi Wigderson, IAS.
Quantum Money from Hidden Subspaces Scott Aaronson and Paul Christiano.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Randomness Extraction and Privacy Amplification with quantum eavesdroppers Thomas Vidick UC Berkeley Based on joint work with Christopher Portmann, Anindya.
Foundations of Cryptography Lecture 2: One-way functions are essential for identification. Amplification: from weak to strong one-way function Lecturer:
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Robust Randomness Expansion Upper and Lower Bounds Matthew Coudron, Thomas Vidick, Henry Yuen arXiv:
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
Derandomized parallel repetition theorems for free games Ronen Shaltiel, University of Haifa.
Short course on quantum computing Andris Ambainis University of Latvia.
On the Composition of Public- Coin Zero-Knowledge Protocols Rafael Pass (Cornell) Wei-Lung Dustin Tseng (Cornell) Douglas Wiktröm (KTH) 1.
Some Limits on Non-Local Randomness Expansion Matt Coudron and Henry Yuen /12/12 God does not play dice. --Albert Einstein Einstein, stop telling.
Outline 1.Introduction 2.The Framework of Untrusted-Device Extraction. 3.Our results 4.Proof Techniques: Miller-Shi 5.Proof Techniques: Chung-Shi-Wu 6.Further.
Quantum Computing MAS 725 Hartmut Klauck NTU
Complexity 18-1 Complexity Andrei Bulatov Probabilistic Algorithms.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Randomized and Quantum Protocols in Distributed Computation Michael Ben-Or The Hebrew University Michael Rabin’s Birthday Celebration.
Oded Regev Tel-Aviv University On Lattices, Learning with Errors, Learning with Errors, Random Linear Codes, Random Linear Codes, and Cryptography and.
1 Streaming Computation of Combinatorial Objects Ziv Bar-Yossef U.C. Berkeley Omer Reingold AT&T Labs – Research Ronen.
CS151 Complexity Theory Lecture 10 April 29, 2004.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Computer Security CS 426 Lecture 3
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Simulating independence: new constructions of Condensers, Ramsey Graphs, Dispersers and Extractors Boaz Barak Guy Kindler Ronen Shaltiel Benny Sudakov.
How to play ANY mental game
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Ragesh Jaiswal Indian Institute of Technology Delhi Threshold Direct Product Theorems: a survey.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Physical Randomness Extractor Xiaodi Wu (MIT) device ……. Ext(x,s i ) Ext(x,0) Decouple ……. Z1Z1 ZiZi Z i+1 Eve Decouple ……. x uniform-to-all uniform-to-device.
Why Extractors? … Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial.
QCCC07, Aschau, October 2007 Miguel Navascués Stefano Pironio Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Cryptographic properties of.
BY Lecturer: Aisha Dawood. The hiring problem:  You are using an employment agency to hire a new office assistant.  The agency sends you one candidate.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Black-box Tomography Valerio Scarani Centre for Quantum Technologies & Dept of Physics National University of Singapore.
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
Amplification and Derandomization Without Slowdown Dana Moshkovitz MIT Joint work with Ofer Grossman (MIT)
Extractors: applications and constructions Avi Wigderson IAS, Princeton Randomness.
The question Can we generate provable random numbers? …. ?
Randomness Extraction Beyond the Classical World Kai-Min Chung Academia Sinica, Taiwan 1 Based on joint works with Xin Li, Yaoyun Shi, and Xiaodi Wu.
What are the minimal assumptions needed for infinite randomness expansion? Henry Yuen (MIT) Stellenbosch, South Africa 27 October 2015.
Quantum Cryptography Antonio Acín
Pseudo-random generators Talk for Amnon ’ s seminar.
Iftach Haitner and Eran Omri Coin Flipping with Constant Bias Implies One-Way Functions TexPoint fonts used in EMF. Read the TexPoint manual before you.
Error-Correcting Codes and Pseudorandom Projections Luca Trevisan U.C. Berkeley.
New Results of Quantum-proof Randomness Extractors Xiaodi Wu (MIT) 1 st Trustworthy Quantum Information Workshop Ann Arbor, USA 1 based on work w/ Kai-Min.
Does Privacy Require True Randomness? Yevgeniy Dodis New York University Joint work with Carl Bosley.
Umans Complexity Theory Lecturess Lecture 11: Randomness Extractors.
Secret keys and random numbers from quantum non locality Serge Massar.
PROBABILITY AND COMPUTING RANDOMIZED ALGORITHMS AND PROBABILISTIC ANALYSIS CHAPTER 1 IWAMA and ITO Lab. M1 Sakaidani Hikaru 1.
Probabilistic Algorithms
Sampling of min-entropy relative to quantum knowledge Robert König in collaboration with Renato Renner TexPoint fonts used in EMF. Read the TexPoint.
Cryptographic Hash Functions Part I
Background: Lattices and the Learning-with-Errors problem
CMSC 414 Computer and Network Security Lecture 3
The Curve Merger (Dvir & Widgerson, 2008)
Cryptography Lecture 5.
Presentation transcript:

Feb 18 th, 2014 IQI Seminar, Caltech Kai-Min Chung IIS, Sinica,Taiwan Yaoyun Shi University of Michigan Xiaodi Wu MIT/UC Berkeley device ……. Ext(x,s i ) Ext(x,0) Decouple ……. Z1Z1 ZiZi Z i+1 Eve Decouple ……. x uniform-to-all uniform-to-device

Randomness is PRECIOUS Digital security Randomized algorithms Scientific simulations Gambling Statistics, Samplings,….

We are not always getting it …. Heninger et al. broke the keys of many SSH hosts by exploiting insufficient randomness. From the introduction: “Ultimately the results of our study should serve as a wake-up call that secure random number generation continues to be an unsolved problem in important areas of practice.”

Wish list for Randomness High quality close to uniform small error Secure classical/quantum adversary Large quantity 1 trillion bits/day? efficiency Minimum assumptions least amount of trust

How can we be sure it’s random? How could fundamentally unpredictable events possible?

We can’t be sure … without believing first of all its existence Super-Deterministic World v.s. World with Randomness we could live in the “Matrix”……

Assumptions: Non-deterministic World (conditional) min-entropy CLASSICAL Solution x~(n,k) min-entropy: necessary and sufficient Extract Almost Uniform Bits! Either Independent short uniform Seed ~ log(n) Extractor Eve Extractor Or Independent another min-entropy source REQUIRES: Independent IMPOSSIBILITY: x~(n,k) Extractor Eve deterministic extraction impossible even for Santha-Vazirani (SV) source SV source: x 1,x 2,…,x n,…,each bit x i has a bounded bias conditioned on previous bits Highly random: linear min-entropy Independence Between Sources hard to enforce / verify

Assumptions: Non-deterministic World (conditional) min-entropy QUANTUM Solution (Trust-based) Independence Between Sources hard to enforce / verify Quantum Mechanics the principle of the nature IDQ/ Swiss Goverment Trust-based solutions are simple

Assumptions: Non-deterministic World (conditional) min-entropy QUANTUM Solution (No-Trust) Independence Between Sources hard to enforce / verify Quantum Mechanics the principle of the nature IDQ/ Swiss Goverment Trust-based solutions are simple We, classical human being, only trust classical operations! Can classical operations verify quantum behavior? Well, this is not new…… Device-independent Quantum Cryptography The Central Rule: Trust classical operations only. Quantum operations must be verified through classical means. Origins in the 90’s [Mayers-Yao’98] Develop rapidly very recently!

Assumptions: Non-deterministic World (conditional) min-entropy Independence Between Sources hard to enforce / verify Quantum Mechanics the principle of the nature IDQ/ Swiss Goverment Trust-based solutions are simple Communicati on impossible AB QUANTUM Solution: How? Similar to Bell-Test: separate quantum from classical! 1) Non-locality + Statistical Test: enforce quantum behavior 2) Entanglement Monogamy: against quantum adversaries Successful Examples: (incomplete list) 1)QKD [BHK05, MRC+06, MPA, VV13, BCK13, RUV13, MS13] 2)Randomness Expansion [PAM+10, PM11, FGS11, VV12, CVY13, MS13, CY13] 3)Free-randomness (SV) Amplification [CR12, GMdlT+12, MP13,…] 4)Quantum Bit Commitment & Coin Flipping [SCA+11] 5)Quantum Computation Delegation [RUV13, MacK13] Spatial Separation not an assumption; verifiable Special Relativity MINIMUM ASSUMPTIONS another principle of the nature

Parameters: Physical Randomness Extractors: Model Adversary deterministic & classical min-entropy source almost perfect randomness Devices Adversary: all powerful quantum Prepares devices No communication Devices: spatially separated User: classical/deterministic can restrict communication among device components only classical operations Min-entropy source quality varies Accept/Reject options Acc: output uniform bits Rej: catch cheating devices Source: Efficiency: Errors: running time T output length N # devices D

Parameters: Physical Randomness Extractors: Goals Adversary deterministic & classical min-entropy source almost perfect randomness Devices Source: Efficiency: Errors: running time T output length N # devices D BASIC

Parameters: Physical Randomness Extractors: Goals Adversary deterministic & classical min-entropy source almost perfect randomness Devices Source: Efficiency: Errors: running time T output length N # devices D BASIC PREMIUM Entanglement Usage

Main Results: Goal List : BASIC PREMIUM Quantum Security any min-entropy Polynomial time robustness const # devices Main Theorem: there exist physical randomness extractors that achieve all basic goals and a subset of premium goals with any random-to-device source.

Main Results: Goal List : BASIC PREMIUM Quantum Security any min-entropy Polynomial time robustness const # devices Main Theorem: there exist physical randomness extractors that achieve all basic goals and a subset of premium goals with any random-to-device source.

Why physicists should pay attention? Super-deterministic world vs Uniformly random world God does not play dice~~~~ A.E. Do completely unpredictable (uniformly random) events exist in the nature? A Possible Dichotomy Theorem: Weak "uncertainty" (e.g., an event happen w.p. 1%) against environment Full "uncertainty“ (uniformly random) against environment deterministic operation no introduction of randomness Get rid of SV source assumption [CR12]: a restricted version of weak uncertainty. Nature could be more tricky! application to close the “free-choice” loophole of Bell-Tests! If the world is not deterministic, then can faithfully create uniformly random events

Challenges from arbitrary min-entropy source x~(n,k) Sanity Check: How to certify super-classical behavior using non-uniform/low quality randomness? Well, most known examples use uniform bits, e.g., CHSH, randomness expansion and quantum/classical separation sensitive to input distribution Known Examples: Santha-Vazirani source [CR12, GMdlT13+…] SV source: x 1,x 2,…,x n,…,each bit x i has a bounded bias conditioned on previous bits Highly random: linear min-entropy for CHSH game, if the input is only uniform over {(0,0), (0,1), (1,0)}, then NO quantum/classical separation! still with very large min-entropy, but not with full support! Proof Idea: brute force analysis  protocol non-constructive, inefficient, non-robust Moreover, still rely on SV being very “close” to uniform!

Improve the quality of the source Somewhere Random Source (SR source): A random object divided into blocks. There exists one block (marginal) that is uniformly random. X : any (n,k) source EXT(X,s 1 )EXT(X,s 2 )EXT(X,s 3 )EXT(X,S)EXT(X,s 2 d ) ……. Device quantum-proof random-to-device uniform-to-device Unfortunately NO! because of correlations! locally !

Quantum Aid: certify fresh uniform bits XOR fails because of correlations! in fact, IMPOSSBILE by any classical operation! Decouple Quantum Randomness Decoupling Input X: only uniform to device, any correlated otherwise Output Z: uniform to all, even conditioned on X Key Observations: 1) known randomness expansion protocols serve as “quantum randomness decoupling” except they require uniform-to-all seeds. Quality of source again! 2) Security lift by “Equivalence Lemma”: any such protocols that work with uniform-to-all seeds also work with just uniform-to-device seeds. Fundamental Principle for such compositions! Key Observations: 1) known randomness expansion protocols serve as “quantum randomness decoupling” except they require uniform-to-all seeds. Quality of source again! 2) Security lift by “Equivalence Lemma”: any such protocols that work with uniform-to-all seeds also work with just uniform-to-device seeds. Fundamental Principle for such compositions! uniform-to-device

The “Equivalence” Lemma Statement : uniform-to-all seeds can be replaced by uniform-to-device seeds for randomness expansion protocols. Seeds Device Environment PROTOCOL any such protocols! A fundamental principle of studying composition in device-independent protocols. Already find a powerful application in “unbounded expansion”. to-device -> to-all Attack to-device Proof Sketch: (to-device -> to-all) -1 1)Assume an attack (to-device seeds) 2)Construct “to-device -> to- all” 3)Require: invertible & commute with Protocol 4)Find contradiction! uniform-to-device uniform-to-all SUCCESS FAIL (to-device -> to-all) -1 Contradiction!

The “Equivalence” Lemma: Applications Example: Unbounded Expansion with const # devices Expansion 1 Expansion 2 A simple proposal [FGS11, folklore?] Hard to Analyze! Reason: uniform-to-all seeds vs uniform-to-device seeds again! the output of a device is correlated with that device, thus not uniform-to-all. Coudron-Yuen uses heavy machinery [RUV13] to achieve the same goal (called “Input Security”) lead to a non-robust version of unbounded expansion DIRECTLY implied by the “Equivalence Lemma”, lead to a robust version of unbounded expansion [Miller-Shi]

Put things together device ……. Ext(x,s i ) Ext(x,0) Ext(x,s 2^d ) Decouple ……. Z1Z1 ZiZi Z i+1 Eve Decouple ……. x random-to-device uniform-to-all uniform-to-device Instantiations: Extractor Trevisan’s extractors (quantum-proof) Instantiation 1: Instantiation 2: Decouple Miller-Shi unbounded (robust) Coudron-Yuen unbounded (non-robust) Miller-Shi exponential (robust, crypt. secure) Vazirani-Vidick exponential (non-robust)

Where is the randomness from? a personal view Adversary deterministic & classical min-entropy source almost perfect randomness Devices Is it from the source? UNLIKELY! Is it from the EPRs? Not Sure! Seems NO! Nonlocality helps certification! New View: Entanglement and min-entropy source just to help certify: Or slightly more complicated! source & entangle ment

Summary Open Questions MINIMUM ASSUMPTIONS Main Theorem: there exist physical randomness extractors that achieve all basic goals and a subset of premium goals with any random-to-device source.