1 / 18

Quantum Public Key Cryptography with Information-Theoretic Security

Quantum Public Key Cryptography with Information-Theoretic Security. Daniel Gottesman Perimeter Institute. Advantages of Public Key Crypto. High efficiency New protocols Public key encryption Digital signatures Better key distribution and management No danger that public key compromised

selia
Download Presentation

Quantum Public Key Cryptography with Information-Theoretic Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Quantum Public Key Cryptography with Information-Theoretic Security Daniel Gottesman Perimeter Institute

  2. Advantages of Public Key Crypto • High efficiency • New protocols • Public key encryption • Digital signatures • Better key distribution and management • No danger that public key compromised • Convert authenticated channel to secure channel in interactive setting (QKD can do this too) • Certificate authorities • PGP (many redistribution sites)

  3. Quantum Public Keys • Consider a map f: k fk. • k is the private key • fk is the public key For some maps f, it can be impossible (information-theoretically) to determine k, even given many copies of fk. However, there is a limit. More copies of fk means more information about k, and even one copy generally leaks some information about k.

  4. Quantum Fingerprinting For example, we can let k be an O(2n)-bit string and fk be n qubits long using quantum fingerprints (Buhrman, Cleve, Watrous, de Wolf 2001). One construction: Let C be a [2n, r2n, p2n] code, with max dist. (1-p)2n,and let x(k,i) be the ith bit of the codeword encoding k. Then fk = 2-n/2 i (-1)x(k,i) i, which implies that fjfk  1-2p (when ij).

  5. Quantum One-Way Function From n qubits, we can extract at most n classical bits of information, so T copies of fk can only give at most Tn bits of information about k, which is r2n bits long. Thus, the function f: k fk is hard (impossible, actually) to invert, even given many copies of the output. It is a one-way function. This is why it is safe to use fk as a public key: we can give it to many people without revealing the private key k.

  6. One-Time Digital Signature Classical scheme (Lamport 1979): One-way function f(x), private key (k0, k1), public key (f(k0), f(k1)). To sign a bit b, send (b, kb). Quantum scheme (Gottesman, Chuang 2001): • Private key (k0(i), k1(i)) (i=1, ..., M) • Public key (fk) (for k=kb(i)) • To sign b, send (b, kb(1), kb(2), ..., kb(M)). • To verify, measure fk to check k = kb(i).

  7. Different Levels of Acceptance Suppose s keys fail the measurement test: s  c1M  1-ACC: Message comes from Alice, other recipients will agree. c1M < s  c2M  0-ACC: Message comes from Alice, another recipient might disagree. s > c2M  REJ: Message might not come from Alice. Similar to classical pseudo-signatures (Chaum and Roijakkers 1991), which are information-theoretically secure, but with complex set-up procedure.

  8. Quantum Public Key Encryption • Protocol defines map k  Uk (unitary) • Alice’s private key k • Public key (I  Uk) (00 + 11) • To encrypt a quantum state , teleport state through the public key, getting Pauli matrix P. Transmit P and 2nd register of public key. • Alice receives (P, Uk P ). Decrypts by performing Uk-1then P-1.

  9. Notes on Quantum Public Key Encryption • Expends one copy of the public key per encrypted message. • When Ukruns over Pauli matrices, this is the one-time pad, but only one copy of public key is allowed. • For larger sets of Uk, it is impossible to learn k completely. However, I have no security proof.

  10. SWAP test BCWW also introduced a test to check if two fingerprints are the same without knowing their exact state: 0 + 1 Measure 0 + 1 vs. 0 - 1 fj fj fk fk • If they are the same, + result (fingerprints are unchanged) • If they are different, often - result Controlled-SWAP

  11. keep 1 1 SWAP SWAP SWAP 2 discard Distributed SWAP Test Two problems with the straight SWAP test: • How can we do a SWAP test at a distance? • A SWAP test against a bad key corrupts your copy. Distributed SWAP test: key key key key Charlie Bob

  12. Quantum Public Key Distribution Alice B E D C F can compare if the public keys received from B and D are the same. F

  13. Certificate Authorities A certificate authority signs other people’s public keys. Everyone has the CA’s public key already, and they trust the CA to verify the public key’s source. Main advantage: the CA only needs to be involved in the distant past. Can we make a certificate authority for quantum public keys?

  14. No Signatures of Quantum States There is no signature scheme for unknown quantum states, even with computational security. Anyone who can read the signed state can change it.(BCGST 2002) Let Sk() be the signed state for  (purified). To read the state, use U: Sk()   Rk(). But No-Cloning implies Rk() = Rk does not depend on . U To cheat: Sk()  Rk U-1  Rk Sk()

  15. Signing Known Quantum States However, this argument does not apply to a state which is known by the signer, or even if the signer has multiple copies of . Can we sign a known quantum state? Yes, sort of: we can sign the classical description of the state. What we really want is to sign the state efficiently in the number of qubits. Can we do this? Unknown.

  16. Signing Known Quantum States Solutions to this problem could potentially allow: • More efficient quantum signatures: sign a fingerprint of the classical message. • Reusable quantum signatures: sign a message plus a new quantum public key. • Quantum certificate authority: Provide multiple copies of your public key to the CA, allowing him to sign them.

  17. Quantum Signature Efficiency One-time quantum signatures are very inefficient, but if it is possible to sign known states as suggested on the previous slide, they could become very efficient. • Key length to sign n-bit message: O(log n)? • Number of messages from single key: exp.? • However: length of private key is still proportional to # of copies of public key. None of this is proved.

  18. Capabilities of Quantum Public Keys • High efficiency (No?) • New protocols • Public key encryption (Yes?) • Digital signatures (Yes) • Better key distribution and management • No danger that public key compromised (Yes) • Convert authenticated channel to secure channel (Yes, QKD) • Certificate authorities (Yes??) • PGP (many redistribution sites) (Yes)

More Related