Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.

Slides:



Advertisements
Similar presentations
Introduction to Quantum Teleportation
Advertisements

Quantum Cryptography Post Tenebras Lux!
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Quantum Computing MAS 725 Hartmut Klauck NTU
Christian Schaffner CWI Amsterdam, Netherlands Position-Based Quantum Cryptography: Impossibility and Constructions Seminar Eindhoven, Netherlands Wednesday,
Position-Based Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic Tea, ILLC Tuesday, 14/02/2012.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Short course on quantum computing Andris Ambainis University of Latvia.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Quantum Key Distribution Yet another method of generating a key.
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
A Brief Introduction to Quantum Computation 1 Melanie Mitchell Portland State University 1 This talk is based on the following paper: E. Rieffel & W. Polak,
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum Public Key Cryptography with Information- Theoretic Security Daniel Gottesman Perimeter Institute.
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Institute of Technical Physics Entanglement – Beamen – Quantum cryptography The weird quantum world Bernd Hüttner CPhys FInstP DLR Stuttgart.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Position-Based Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Advances in Quantum Cryptography Workshop.
Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Bachelor.
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Workshop on Post-Quantum Security Models Paris, France Tuesday,
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 19 (2009)
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Amsterdam.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
PRESENTED BY MIDHUN.T - EC 3 - S 61 TOPIC – QUANTUM TELEPORTATION Presented by - MIDHUN T EC 3, S 6 ROLL NO. 20 Reg no
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Michele Mosca Canada Research Chair in Quantum Computation 27 May 2006 Introduction to quantum technologies: quantum computers, quantum teleporters & cryptography.
Introduction to Quantum Key Distribution
Christian Schaffner, PhD student NF-årsfest 2005 A A R H U S U N I V E R S I T E T DAIMI – Department of Computer Science BRICS – Basic Research in Computer.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Bell Measurements and Teleportation. Overview Entanglement Bell states and Bell measurements Limitations on Bell measurements using linear devices Teleportation.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September.
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Tropical QKD Waterloo, ON, Canada Wednesday, 16 June 2010.
Cryptography In the Bounded Quantum-Storage Model
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Cryptography Christian Schaffner
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Formal Verification of Quantum Cryptography Dominique Unruh University of Tartu.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Christian Schaffner
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Secret keys and random numbers from quantum non locality Serge Massar.
Cryptography in the Bounded-Quantum-Storage Model Christian Schaffner BRICS, University of Aarhus PhD Defense Friday, April 27 th 2007.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Homomorphic encryption of quantum data
Quantum Cryptography Christian Schaffner ICT OPEN 2017
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Key Distribution
Quantum Teleportation
Quantum Cryptography Christian Schaffner
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Presentation transcript:

Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica QuSoft Seminar Friday, 22 January 2016

2 1969: Man on the Moon NASA The Great Moon-Landing Hoax? How can you prove that you are at a specific location?

3 What will you learn from this Talk? Introduction to Quantum Mechanics Quantum Key Distribution Position-Based Cryptography

4 Quantum Bit: Polarization of a Photon qu b i t asun i t vec t or i n C 2

5 Qubit: Rectilinear/Computational Basis

6 Detecting a Qubit Bob No photons: 0 Alice

7 Measuring a Qubit Bob No photons: 0 Photons: 1 with prob. 1 yields 1 Measurement: 0/1 Alice

8 Diagonal/Hadamard Basis with prob. ½ yields 0 with prob. ½ yields 1 Measurement: 0/1 =

9 Measuring Collapses the State with prob. ½ yields 0 with prob. ½ yields 1 Measurement: 0/1 =

10 Measuring Collapses the State = =

11 Quantum Mechanics with prob. 1 yields 1 Measurements: + basis £ basis with prob. ½ yields 0 with prob. ½ yields 1 0/1

Wonderland of Quantum Mechanics

13 EPR Pairs prob. ½ : 0prob. ½ : 1 prob. 1 : 0 [Einstein Podolsky Rosen 1935] “spukhafte Fernwirkung” (spooky action at a distance) EPR pairs do not allow to communicate (no contradiction to relativity theory) can provide a shared random bit EPR magic!

14 Quantum Teleportation [Bennett Brassard Crépeau Jozsa Peres Wootters 1993] quantum one-time pad encryption (applying a random Pauli operation) does not contradict relativity theory Bob can only recover the teleported qubit after receiving the classical information ¾ [Bell]

15 Demonstration of Quantum Technology 15 generation of random numbers (diagram from idQuantique white paper)idQuantique no quantum computation, only quantum communication required 50%

16 What will you Learn from this Talk? Introduction to Quantum Mechanics Quantum Key Distribution Position-Based Cryptography

17 No-Cloning Theorem Quantum operations: U Proof: copying is a non-linear operation

Quantum Key Distribution (QKD) Alice Bob Eve Offers an quantum solution to the key-exchange problem which does not rely on computational assumptions (such as factoring, discrete logarithms, etc.) Puts the players into the starting position to use symmetric-key cryptography (encryption, authentication etc.). [Bennett Brassard 84] 18 k = k = ?

Quantum Cryptography Landscape 19 attackers systems efficient classical attacks efficient quantum attacks everlasting security (store and break later) AESconfidentlonger keysbrute force SHAconfidentlonger outputsbrute force RSA, DiscLogsconfidentShorbrute force Hash-Based Signprobably brute force McElieceprobably brute force Lattice-basedprobably brute force QKD physical security Post Quantum Crypto technical difficulty (€)

Quantum Key Distribution (QKD) [Bennett Brassard 84] k = 110

Quantum Key Distribution (QKD) [Bennett Brassard 84] k = 10 Quantum states are unknown to Eve, she cannot copy them. Honest players can test whether Eve interfered. k = ?

Quantum Key Distribution (QKD) Alice Bob Eve technically feasible: no quantum computer required, only quantum communication [Bennett Brassard 84] 22

Quantum Key Distribution (QKD) Alice Bob Eve technically feasible: no quantum computer required, only quantum communication [Bennett Brassard 84] 23

24 Quantum Hacking e.g. by the group of Vadim Makarov (University of Waterloo, Canada)Vadim Makarov

25 What will you Learn from this Talk? Introduction to Quantum Mechanics Quantum Key Distribution Position-Based Cryptography

26 Position-Based Cryptography Typically, cryptographic players use credentials such as secret information (e.g. password or secret key) authenticated information biometric features Can the geographical location of a player be used as cryptographic credential ?

27 Position-Based Cryptography Possible Applications: Launching-missile command comes from within your military headquarters Talking to the correct assembly Pizza-delivery problem / avoid fake calls to emergency services … Can the geographical location of a player be used as sole cryptographic credential ?

28 Basic task: Position Verification Prover wants to convince verifiers that she is at a particular position no coalition of (fake) provers, i.e. not at the claimed position, can convince verifiers (over)simplifying assumptions: communication at speed of light instantaneous computation verifiers can coordinate Verifier1 Verifier2 Prover

29 Position Verification: First Try Verifier1 Verifier2 Prover time distance bounding [Brands Chaum ‘93][Brands Chaum ‘93]

30 Position Verification: Second Try Verifier1 Verifier2 Prover position verification is classically impossible ! [Chandran Goyal Moriarty Ostrovsky 09]

31 The Attack copying classical information this is impossible quantumly

32 Position Verification: Quantum Try [Kent Munro Spiller 03/10] Can we brake the scheme now?

33 Attacking Game Impossible to cheat due to no-cloning theorem Or not? ? ?

34 Quantum Teleportation [Bennett Brassard Crépeau Jozsa Peres Wootters 1993] does not contradict relativity theory Bob can only recover the teleported qubit after receiving the classical information ¾ [Bell]

35 Teleportation Attack It is possible to cheat with entanglement !!entanglement Quantum teleportation allows to break the protocol perfectly. Quantum teleportation [Bell]

36 No-Go Theorem Any position-verification protocol can be broken using an exponential number of entangled qubits. Question: Are so many quantum resources really necessary? Does there exist a protocol such that: honest prover and verifiers are efficient, but any attack requires lots of entanglement [Buhrman, Chandran, Fehr, Gelles, Goyal, Ostrovsky, Schaffner 2010][Buhrman, Chandran, Fehr, Gelles, Goyal, Ostrovsky, Schaffner 2010] [Beigi Koenig 2011][Beigi Koenig 2011] see for recent developmentshttp://homepages.cwi.nl/~schaffne/positionbasedqcrypto.php

37 What Have You Learned from this Talk? Quantum Mechanics Qubits No-cloning Entanglement Quantum Teleportation

38 What Have You Learned from this Talk? Position-Based Cryptography Quantum Key Distribution (QKD)QKD

Thank you for your attention! Questions check for a survey about quantum cryptography beyond key distributionhttp://arxiv.org/abs/