Top Banner
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University
25

A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Jan 11, 2016

Download

Documents

Clemence Foster
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

A Few Simple Applications to Cryptography

Louis SalvailBRICS, Aarhus University

Page 2: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

102344578911

QKD: An “Application” of Non-Cloning

• First, a digression:

Wiesner’s unforgeable quantum cash

0 0 1 1 1 1 0 0 1 1 0 1 0 1

102344578907 +x++xx+xx++x++ 10100010010110102344578908 x++x+x++x+x+xx 10010110001110102344578909 ++xx+xx+x+++x+ 11010111001010102344578910 x+xxx++x+x+++x 01101010011000102344578911 +x++xx+x+x+xx+ 00111100110101102344578912 x+xx++x+x++x++ 10101101110100102344578913 xx+x++x+x+++x+ 01010010011101102344578914 +x+x+++xx+x++x 01010111101000102344578915 x+++xx+x+x+++x 10110101010111

2nd attack:

1st attack:pick random bases, measure and store the outcome.

0 0 1 0 1 1 0 0 1 1 0 0 0 1 0 0 1 0 1 0 0 0 1 1 0 1 0 1

Page 3: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

BB84

01101010

01111011

Quantum Channel

quantum

classical

OK

1,3,5,6,7-----((1,0),(7,1))

OK,f

Verify that not 2-many

errors occured.

If OK then choose f

randomly from U2 class.

K=f(110)K=f(110)

Return good positionsand a random sample.

error-correction

0*1*101*

0*1*101*

110

110

Page 4: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

HardwareThis is how a QKD set-up looked like a few years ago.

photodetector:

photon sourceAnd now:

Page 5: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Purified BB84This EPR pair is a singlet:

11011100

11010100

Page 6: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Encrypting Qubits• Suppose we want to encrypt a qubit

under a classical secret-key K, such that:

• The cipher state alone does not reveal any information on the state of the qubit.

Using K, the qubit can be perfectly reconstructed from the cipher state.

Page 7: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Encryption/Decryption

• We suppose that encryption is performed by a family of unitary transforms {UK}K indexed by secret-key K.

• The simplest form is that upon qubit |φ>, the cipher state is generated as:

• |eK(φ)> = UK |φ>.

Decryption is performed by running UK backward (its complex conjugate transposed).

Page 8: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Privacy• Privacy means that given only the cipher

state |eK(φ)>, no information can be extracted about the state |φ>.

• This can be captured by enforcing that the quantum state produced by an encryption under a uniform and random choice for K is independent of |φ> .

This would mean that an eavesdropper ignorant of K always sees the same state. No measurement can therefore distinguish the encryptions of any 2 states.

Page 9: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

The State Available to the

EavesdropperAs we have seen, the state available to the adversary when |φ> is encrypted is the mixed state corresponding to the encryption of |φ> over all keys:

An encryption scheme is therefore said to be private if:

Page 10: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Back to Teleportation

(x,z)

with prob. 1/4:(0,0)

with prob. 1/4:(0,1)

with prob. 1/4:(1,0)

with prob. 1/4:(1,1)

Page 11: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Encryption/DecryptionSuppose Alice and Bob share K ∈ {0,1}×{0,1}:

If K=(0,0)

If K=(0,1)

If K=(1,0)

If K=(1,1)

Since XX=ZZ=-YY=I, Bob decrypts by applying the same transform indicated by K:

Page 12: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

In General• It can be shown that 2 classical bits are

necessary in order to encrypt with perfect privacy (and with perfect decryption) an arbitrary qubit.

• If the possible states of the qubit are restricted to some special sets then 1 classical could be sufficient.

For the encryption of qubits with only statistical privacy and almost perfect descryption, a single classical bit per qubit is asymptotically sufficient.

Page 13: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

First Special CaseSuppose the possible states of the qubit are { |0>, |1> }. The situation is now classical and the one-time-pad (one bit per qubit) provides perfect privacy.

Notice that the encryption of these 2 states using X with probability 1/2 is exactly the same as the one-time-pad.

Page 14: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Second Special Case

Suppose the qubit to encrypt is of the form |φ> = a|0> + b|1> where a, b are real numbers.

Now, observe that:

So, only complex amplitude states require 2 bits of key.

Page 15: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Committing a Qubit

• Teleportation also allows to see how one can commit on a qubit given only a classical commitment scheme.

Suppose the scheme allows for committing on a pair of classical bits.

Encrypt |φ> using a

random key K.

classical commitment of K

Page 16: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Encrypting Classical Messages in Quantum

States• Consider the symmetric encryption of

classical messages in quantum states.

• We’ll get a simple encryption scheme that resists “better” to known plaintext attacks than any classical scheme.

It is based upon what is called an uncertainty relations.

Page 17: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Hadamard TransformRemember that:

Let’s define the following 2 Von Neumann measurements on n qubits (computational & diagonal basis):

Associated to |φ>, we can define the 2 probability distributions for the outcomes of M+ and Mx when applied to |φ>:

Page 18: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Uncertainty Relation

• The following uncertainty relation has been shown by Maassen and Uffink.

• We shall denote by H(pφ) and H(qφ) the Shannon entropy for distributions pφ(x) and qφ(x) respectively.

Theorem: For any n-qubit state |φ>, it is the case that

H(pφ) + H(qφ) ≥ n.

Page 19: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

An equivalent uncertainty relation

• Suppose that a source S sends a quantum state chosen as follows:

• Pick x in {0,1}n at random,

• With prob. 1/2 send |x>,

• With prob. 1/2 send H⊗n|x>.Theorem: Let X be the random variable describing the choice made by S above. Let Y be the random variable for the outcome of an arbitrary measurement applied to the state sent by S. Then, for any outcome y:

H(X|Y=y) ≥ n/2.

Page 20: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Encryption Scheme• The key K=(p,h) where p ∈ {0,1}n and h

∈ {0,1}.

• The encryption of message m is done the following way:

• c := m ⊕ p

• If h=0 then send |c>

• Else send H⊗n|c>.Notice that the scheme is private since the message m is one-time-padded.

This is a (n,n+1)-encryption scheme: it encrypts n-bit messages using n+1 bit of keys.

This is called the Hn-cipher

Page 21: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Known Plaintext AttacksIn a known plaintext attack, the adversary gets the ciphertext(cipherstate), the plaintext and wants to extract as much information as possible on the secret-key.

Theorem: Any classical (n,n+1)-cipher is such that H(K| c,m) ≤1.Theorem: The (n,n+1)-quantum cipher Hn is such that

H((p,h) | (H⊗n)h | |m⊕p>,m)≥ n/2.Proof sketch: Given m and the situation is equivalent to distinguishing among {|p>,H⊗n|p>}p∈{0,1}

n . We have seen that the entropy on p is

at least n/2. In addition, it can be shown that the extra bit of key h is perfectly hidden. It follows that:

H((p,h) | View) ≥ n/2+1.

Page 22: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Secure Evaluation of an AND gate

AND

x ∈{0,1} y ∈{0,1}

a b

a⊕b = xyTheorem: Even with shared randomness, Alice and Bob cannot implement the AND gate without communication such that with probability better 3/4 Alice and Bob end up with a correct output for all possible inputs.

Page 23: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Quantum Crypto-AND gate

x y

B1(0)

B1(1)

A0(0)

A0(1) A1(0

)A1(1

)

B0(0)

B0(1)

The interpretation: Given x, Alice measures her half EPR-pair in

basis {Ax(0),Ax(1)},Given y, Bob measures his half EPR-pair in basis

{By(0),By(1)}.

Page 24: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Why it WorksLet p(x,y) be the error-probability when Alice inputs x and Bob inputs y:

Page 25: A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.

Conclusion• With shared-EPR pairs, Alice and Bob can

end up with an additive sharing for the AND of their bits without communication and with probability cos2(π/8)≈0.85.

• This is significantly better than what is achievable by any classical strategy using shared randomness.

• Quantum entanglement is therefore more than classical shared randomness!!

This was originally shown by Bell using a different method called the Bell inequalities.