600 likes | 889 Views
Post-Quantum Key Agreement Protocols and Braid group cryptography. Andis Kwan Graduate Center of the City University of New York Chair: Ted Brown Advisor: Michael Anshel Committee: XiangDong Li, Subash Shankar, Christina Zamfirescu http://web.cs.gc.cuny.edu/~ckwan/evote/p.htm. Outline.
E N D
Post-Quantum Key Agreement Protocols and Braid group cryptography Andis Kwan Graduate Center of the City University of New York Chair: Ted Brown Advisor: Michael Anshel Committee: XiangDong Li, Subash Shankar, Christina Zamfirescu http://web.cs.gc.cuny.edu/~ckwan/evote/p.htm
Outline • Why post quantum key exchange? • Braid group cryptography • Our proposal on quantum key exchange - public and private key exchange scheme - hybrid quantum random walk agreement scheme and search protocol • Open discussion/questions
Motivation and Background Practical Public-key Cryptosystems - Diffie-Hellman - RSA - ElGamal - Elliptic Curve Cryptosystems, etc
Shor and Grover • Shor’s[96] factoring and Grover’s[97] searching algorithms on quantum computers • Chuang et al 2001 implemented Shor’s algorithm on 7-qubit quantum computer • NIST 2004 QIP 10-qubit • Id Quantique, MagicQ, NEC http://qubit.nist.gov/
Large-scale quantum computer? • A large-scale quantum computer require > 10^5 qubits. Qubits are well defined entities that cannot be copied, and must be shuttled frequently. • quantum error correcting codes and fault-tolerance. Failure rate drops doubly exponentially allowing us to scale to arbitrary sizes: PL ~ APL-12^L EC Gate EC EC EC
Quantum Simulator • NIST QCsim (Black & Lane 2004) to model Quantum Information Decision Diagrams(QIDD) and read input description in QHDL • [3,1] hamming code in the presence of random bit flip or generalized amplitude noise, non-Monte Carlo, for error correcting code circuit • BB84 with random noise, basis and eavesdropping • Teleportation complexity, measurements vs classical bits • QCL (Oemer 2003), quantum programming language
Quantum Key Distribution (QKD) • BB84, B92, many variations of QKD and quantum secure direct communication (QSDS) depend on entanglement, secret code sharing, and two-way communication such as ping-ping protocol(Boström, 2002; Wójcik, 2003; Hoffmann, 2004) • Recent advance in KKKP(Kye, 2006)
DARPA-NIST-MIT QKD • NIST fiber QKD, 4M bps • KKKP scheme (Kye et al 2005, 2006)
Topology of Braid • Homotopy classes of homeomorphisms of the n-punctured disc which fix the border of the disc and permute the puncture points. • Braid group is the homotopy group of the punctured sphere Dn with a fixed border. Consider n points in R2 with basepoint {(1,0),…,(n,0)}on complex plane C.
Elementary Property of Braid Exact sequence • Theorem: (Artin) • Braid is isomorphic to certain subgroup of automorphism of free group. • Algorithm for the word problem is exponential.
Key Agreement Frame Work • Random source: Satellite • Alice and Bob need to know when to count the bits as keys - Quantum Teleportation - Quantum Clock Synchronization • They agree to flip one bit or more Citations: - Hyper-encryption (Rabin & Ding, 2002) - Teleportation (Kauffman et al., 2004) - Quantum Clock, ticking qubit handshake protocol (Chuang et al., 2000)
Three Key Exchanges • Quantum Public Key Exchange • Post-Quantum Private Key Exchange Protocols • Quantum Walk Agreement Protocols
Private Key Exchange (PKE) Scheme • Quantum clock • Teleport a quantum particle state • Count bits at time t • Key vanishes after use
Quantum PKE Scheme Quantum Clocks Alice Bob Count bits at time t, i.e. t1 Public: key is g and prime p Teleport particle state Flip nth bit of g Set new key = g1 Send (g1) a mod p Send (g1)b mod p K = (((g1) b mod p) a mod p) = (((g1) b mod p) a mod p) Eva
Hybrid Quantum Walk Algorithm • Our scheme extends in two ways: • Uses teleportation and quantum clock synchronization to exchange operator • Tree-walk the graph • Reduces high transmission of errors and defeats man-in-the-middle attack • require only 1-qubit • Our quantum uses Cayley graph of group to model quantum key distribution and the works of: (Kempe, 2003; Hillery, 2005; Ambainis, 2006)
Quantum Walk Agreement Protocols (QWAP) • Alice and Bob perform a random walk on the random bits. They must use the same operator to reach an agreement • Alice and Bob teleport or synchronize with a quantum clock to exchange the operator • They are in synchronization with the same operator, and apply the operator on random bits stream • i.e. tree-walk the graph G
Quantum Walk Agreement Search Algorithm (QWASA) • Select a quantum device • Initialize the quantum system in the uniform superposition | • Do T times: Apply the marked walk U’ • Measure the position register • Check if the measured vertex is the marked item
Quantum Walk • QWAP • Use teleportation and quantum clock synchronization to exchange operator between Alice and Bob • Apply the operator on random bits stream and tree-walk on the graph to determine the key • QWASA • Formulate quantum walk on a graph, Cayley graph of particle spin state • Use a different quantum device and time complexity on discrete quantum walk takes O(√N log N) • May break the QWAP
Possible Attacks • Weak impersonation • Quantum eavesdropping -Splitter - Phase shifters - Others • Timing and parallel attacks • Do we need to update the session key?
Conclusion • Our proposal uses • Hyper-encryption technique • Teleportation and quantum clock mechanism • It is a novel way for quantum key distribution • Our quantum walk agreement is • efficient • secure
Extensions to Our Proposal • Theoretical Model of quantum computation • Topological quantum computer • Anyons and quantum knots • Quantum algorithms
Future Directions • Quantum walk search technique - with better bounds - with different quantum gadgets • Problems: - Initial condition • Localization problems • What kinds of group-theoretic problems can the search technique solve that current classical model can’t?
Future Directions • Quantum walk search technique with better bounds with different quantum gadgets • Initial condition • Localization problems • What kinds of group-theoretic problems can the search technique solve that current classical model can’t?
Thank You ! This proposal is a result of collaboration of CUNY Graduate Students and Faculty CUNY introduces two inter-disciplinary courses: - Classical and Quantum Computing - Quantum Cryptography http://www.cs.gc.cuny.edu/~ckwan/crypto/CQIC.htm
Prepare a simple initial state j00L0i. Perform a universal set of 1- and 2-qubit unitary gates (e.g., H, CNOT, exp[ip Z/8]). Circuit model of quantum computation H eipZ/8 • Make a measurement in the computational basis.
Measurement is universal Two kinds of models: 1.) Product initial state, few-qubit measurements (Gottesman & Chuang, Nielsen, Fenner & Zhang, Leung) • Prepare initial state j00L0i. • Perform a sequence of 2-qubit measurements, conditioned on results of previous measurements. 2.) Entangled initial state, one-qubit measurements (Raussendorf & Briegel) • Prepare an entangled initial state. • Perform a sequence of 1-qubit measurements, conditioned on results of previous measurements.
or equivalently H Teleportation H
Teleportation-based universality of single qubit measurements Teleport logical qubits between different physical qubits. Choice of measurement basis allows us to perform different basic operations. We will show that for certain initial states, it is possible to do a universal set of operations. Problem: Teleportation induces Pauli errors. Fortunately, they are known! Maintain the state of the computation in the form P |y> where |y> is the desired state and P is a known Pauli error.