Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith...

42
Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science http://theory.csail.mit.edu/~asmith Caltech Workshop on Security of Classical and Quantum Protocols December 16, 2005

Transcript of Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith...

Page 1: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

Evolving Notions of Security for Quantum Protocols

Adam SmithWeizmann Institute of Sciencehttp://theory.csail.mit.edu/~asmith

Caltech Workshop on Security of Classical and Quantum ProtocolsDecember 16, 2005

Page 2: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

Evolving Notions of Security for Quantum Protocols

Adam SmithWeizmann Institute of Sciencehttp://theory.csail.mit.edu/~asmith

Caltech Workshop on Security of Classical and Quantum ProtocolsDecember 16, 2005

ProofsOccasionally MistakenUsually Correct,

Frequently

Interesting,

Page 3: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

3

Cryptography in a Quantum World• Landscape changes!

New things are possible New difficulties arise

• Needed: Tools and language for reasoning about quantum adversaries

• The field is still very young Some successes… … occasional mistakes Lots of questions!

quantumthinkersneeded

Isaac Newton

1642-1727

Page 4: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

4

This talk

• Basics of quantum computing

• New Possibilities E.g. quantum key distribution

• New Difficulties, Partial Solutions E.g. rewinding in ZK proofs

• Conclusions & Questions

Page 5: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

5

Quantum Information: Pure States

• “Pure states” = vectors in complex space

• “qubit” = Basic unit of quantum information

|0i + |1i : , 2C , ||2+||2 =1

• Register of n qubits:

xx|xi (where x 2{0,1}n)

• NB: qubit-by-qubit description not enough 2n numbers vs 2n numbers

|0i + |1i

|1i

|0i

Page 6: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

6

Quantum Circuits: 2 kinds of gates

• Invertible operations on n qubits

= 2n£2n unitary matrices ( U-1 = Uy ) |i U |i e.g. Hadamard

• Projective measurements: Ask a qubit: are you 0 or 1? State becomes |0i or |1i

(according to output) Destructive!

|0i + |1i

|1i

|0i

w.prob. |2|

w.prob. |2|

1 11 1

1√2..

Page 7: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

7

Information vs Disturbance

• Important principle of quantum mechanics

• Consequence: No copying!

• Theorem: If A = |i for all inputs |i then B is independent of |i

• Information ) Disturbance

Secrecy ( Resilience to errors

U| i

A

B

Page 8: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

8

This talk

• Basics of quantum computing

• New Possibilities E.g. quantum key distribution

• New Difficulties, Partial Solutions E.g. rewinding in ZK proofs

• Conclusions & Questions

Page 9: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

9

New Possibilities• Key Distribution w/o computational assumptions [BB84]

• Coin flipping with constant bias (see Andris’ talk) • Public-key cryptography with limited keys (see Daniel’s talk)

• Non-locality games (see Ben Toner’s talk) • Uncloneable encryption [G]

• Fast Byzantine agreement [BH05]

• Key re-use (see Louis Salvail’s talk)

• Crypto with quantum data [AMTW00,CGS02,BCGST02,…]

Not a panacea:• Bit commitment, OT, etc are still impossible [M,LC]

• (Probably) does not circumvent composability issues

Page 10: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

10

Quantum Key Distribution [BB84]

• Alice and Bob want to generate a secret key

Alice Bob

Evequantum channelcontrolled by Eve

classical authenticated channelvisible to Eve

Page 11: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

11

Quantum Key Distribution (simplified [E91,LC99])

• Basic tool: EPR pairs State on two qubits

• Say Alice and Bob share an EPR pair Measure each half to get shared, secret bit

• Goal: set up many clean, shared EPR pairs

• Phase I: Alice creates n EPR pairs, send halves to Bob

• Phase II: Alice and Bob test the pairs for tamperingusing classical channel

|+i =|00iAB+|11iAB

|+ni = x |xiA |xiB

Alice Bob

Page 12: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

12

Phase I

• Alice generates n EPR pairs

• Sends halves of these pairs to Bob

• Bob acknowledges receipt

Alice Bob

Eve Eve’s memory

|+ni

“Got them.”

Page 13: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

13

Phase II: Testing

Intuition:

• Many symmetries U such that(UA UB)|+

niAB= |+niAB.

Alice Bob

|+ni

Eve Eve’s memory

“Got them.”

Page 14: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

14

Phase II: Testing• Alice picks symmetry U at random

Applies U and measures last k qubits Sends U and results to Bob Bob applies U and measures last k qubits

• ACCEPT iff measurements agree

Alice Bob

|+ni

Eve Eve’s memory

U, results

U

U

Intuition: ACCEPT )

n – k ‘good’ EPR pairs

Page 15: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

15

Example Symmetries [E91,BCGST02]

• For any invertible binary matrix M 2 {0,1}n£ n :UM|xi = |Mxi

• Alice picks random invertible matrix M,

applies UM

applies Hadamard with probability ½ to each qubit

• Exercise: This preserves |+ni = x |xiA |xiB

Page 16: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

16

Analyzing Security

• Joint state A,B = |n+i

) test passes w.p. 1

• Joint state A,B ? |n+i

) test passes w.p. 2-k

• How can we use this? What’s the security statement? How can we prove it?

span(|+ni)

span(|+ni)?

Page 17: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

17

Analyzing Security

• We want “n–k perfect EPR pairs or REJECT”with high probability

• To show closeness, look at state before test:

|iABE = (AB || |+ni) + (AB ? |+

ni)

• Each piece mapped close to good subspace

EveU

U

subspace subspace+

Page 18: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

18

Analyzing Security

• Theorem: Global state is close to subspace

“n–k perfect EPR pairs or REJECT”

• Are we done? Intuitively meaningful What’s the definition of security here?

• This can be used to build a simulator Good enough to prove UC security [BM, BHLMO’05]

Page 19: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

19

Security as Simulatability [BHLMO’05]

• Theorem: Global state is close to subspace

“n–k perfect EPR pairs or REJECT”

• Ideal protocol: Trusted party asks Eve “Abort or run?” Eve answers 1 bit If “Run” then give good keys to Alice and Bob

real Adv idealSim

Page 20: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

20

Security as Simulatability

• Theorem: Global state is close to subspace

“n–k perfect EPR pairs or REJECT”

• Simulator: Runs dummy execution Output Eve’s view If Eve aborts, send “abort”, else send “run”

real Adv idealdummyexecution

Strong guarantee!

abort?

Page 21: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

21

Lessons of QKD

• We can sometimes test for disturbance Hence for information

• Security proven through simulator Proximity to “good” subspace [LC’99,CGS’02, BHLMO‘05]

Simple form of simulator is good All* QKD protocols have simulator! [BHLMO ‘05]

• Deniability and adaptivity more tricky Some protocols but not all [B‘02]

Page 22: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

22

This talk

• Basics of quantum computing

• New Possibilities E.g. quantum key distribution

• New Difficulties, Partial Solutions E.g. rewinding in ZK proofs

• Conclusions & Questions

Page 23: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

23

New Difficulties (& Partial Solutions)

Computational Assumptions Broken• Factoring and discrete logarithm in BQP [S’94]

• Still lots of candidate one-way functions

• Few candidates for public-key encryption, OT Lattices, codes

• No candidates for Trapdoor 1-Way Permutations (though see [OTU’00]) Non-interactive ZK for NP (though see [K’03])

• See workshop http://postquantum.cr.yp.to/

Page 24: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

24

New Difficulties (& Partial Solutions)

Computational Assumptions Broken

Definitional Paradigms May No Longer Apply• UC paradigm is ok ([BM’05]) what else?

• Bit Commitment Standard requirement: adversary cannot produce a pair:

( decommitment to 0, decommitment to 1 ) OK if commitment is perfectly binding Claim: unconditionally-secure QBC [BCJL]

Adversary cannot decommit to both 0 and 1. But… she can decommit to either!

Workable definitions given later (but complicated) [CDMS,DFS]

Page 25: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

25

New Difficulties (& Partial Solutions)

Computational Assumptions Broken

Definitional Paradigms May No Longer Apply

Information-theoretic Proofs Also Get Broken• Protocols based on extractors: not clear if they remain

secure against bounded quantum memory (Pairwise-independent hashing is ok [KMR])

• Multi-prover commitment schemes can be broken [CST] Some of them can still be fixed, but require very careful proofs. E.g: adversary can win magic square game See Ben Toner’s talk

Page 26: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

26

New Difficulties (& Partial Solutions)

Computational Assumptions Broken

Definitional Paradigms May No Longer Apply

Information-theoretic Proofs Also Get Broken

Basic Proof Techniques May Fail• Fixing random coins

Binding in multiprover commitment schemes Many other places

• Rewinding in ZK proof systems Exception: [Watrous, 2005]

Page 27: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

27

Rewinding and Simulation

• Wanted: simulator that fools quantum adversaries

• Some simulators do work Key distribution Multiparty computation [BGW88,CCD88,RB89,etc]

• “Rigid straight-line simulator” Uses only one black-box run of adversary, even in

proof of correctness of simulation

real Adv idealSim

Few protocols have rigid simulators!

Page 28: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

28

Rewinding in Zero Knowledge: Graph Isomorphism

• ZK proof for graph ismorphism: Input G0, G1.

Given s.t. (G0)=G1.

• Ã Sn.

b à {0,1}G0)

b¢bP

rove

rV

erifier

Page 29: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

29

Rewinding in Zero Knowledge: Graph Isomorphism

• Classical simulator:

• g à {0,1}• à Sn. Vic

Gg)

bS

imul

ator

aux

• If g=b, output state of VicElse, start over!

• What if Vic and aux are quantum? Need to copy to start over First execution might destroy aux

Is the protocol still deniable?

Page 30: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

30

Simulator for Quantum Verifier [W’05]

• Classical simulator: aux

• g à {0,1}• à Sn. Vic

Gg)

bS

imul

ator

Output ( g=b? , state of Vic)1. “Purify” protocol

• Postpone measurements, keep all outputs quantum

Page 31: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

31

Simulator for Quantum Verifier [W’05]

• Classical simulator: aux

• g à {0,1}• à Sn. Vic

Gg)

bS

imul

ator

Output ( g=b? , state of Vic)1. “Purify” protocol

• Postpone measurements, keep all outputs quantum

Page 32: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

32

Simulator for Quantum Verifier [W’05]

• Classical simulator:

1. “Purify” protocol• Postpone measurements, keep all outputs quantum

2. Measure 1 qubit: g©b If simulation successful, output Vic’s state. Else

aux

• g à {0,1}• à Sn. Vic

Gg)b

Sim

ulat

or

Output ( g=b? , state of Vic)

Make it successful

Page 33: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

33

Simulator for Quantum Verifier [W’05]

• Classical simulator:aux

• g à {0,1}• à Sn. Vic

Gg)b

Sim

ulat

or

Output ( g=b? , state of Vic)

• Measuring g©b defines two subspaces W0, W1.

Every verifier Vic defines two states |0i,|1i.

• Theorem[Watrous’05]: there is poly-time unitary UVic s.t.

UVic|0i = |1i.

W0

W1

Page 34: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

34

Simulator for Quantum Verifier [W’05]

• Classical simulator:

1. “Purify” protocol• Postpone measurements, keep all outputs quantum

2. Measure 1 qubit: g©b If simulation successful, output Vic’s state. Else

aux

• g à {0,1}• à Sn. Vic

Gg)b

Sim

ulat

or

Output ( g=b? , state of Vic)

Apply UVic

Output state

Page 35: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

35

Lessons from Watrous’ Simulation

• Quantum simulators are surprisingly powerful NB: Strict poly-time simulation

• Refines our understanding of protocols This simulation works for a sublcass of protocols

Simulator’s success prob. independent* of aux In particular, Hamiltonian path and 3-coloring

Not a subclass that had appeared before (?)

• Use quantum tricks to defeat a quantum adversary

Page 36: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

36

This talk

• Basics of quantum computing

• New Possibilities E.g. quantum key distribution

• New Difficulties, Partial Solutions E.g. rewinding in ZK proofs

• Questions to think about

Page 37: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

37

Quantum Information Requires New Intuitions

• Multi-prover Interacitive Proofs [CHTW04,CST05] Soundness proofs via impossibility of supra-luminal signaling

• Composability and auxiliary information Some primitives require keys only half as long if input is

unentangled with outside world

• Classical Secrecy Sometimes the Best Analogue Secret sharing schemes $ Error-Correcting codes

Approximate quantum codes beat quantum Singleton bound Secret key capacity $ quantum conditional entropy

Negative entropies have similar interpretations

Page 38: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

38

Things I Didn’t Talk About

• Key re-use

• Deniability

• Bounded Quantum Memory / Processing

• Uncloneable encryption

• …

Page 39: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

39

Interesting Open Questions

• Extending Watrous’ argument: What types of rewinding for quantum adversaries? E.g. can we get quantum proofs of knowledge for NP?

• Two-party quantum computation?

• One-way (or trapdoor) permutation candidates which are classically computable in the forward direction? See [OUT’00] for partial version

• UC impossibility results?

(to me) that might be Open

Page 40: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

40

Cryptography in a Quantum World• Landscape changes!

New things are possible New difficulties arise

• Needed: Tools and language for reasoning about quantum adversaries

• The field is still very young Some successes… … occasional mistakes Lots of questions!

quantumthinkersneeded

Isaac Newton

1642-1727

Page 41: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

41

Some references from the talk (a very partial list!)• [AMTW00] Andris Ambainis, Michele Mosca, Alain Tapp, Ronald de Wolf: Private Quantum Channels. FOCS 2000: 547-553• [BCGST02] H. Barnum, C. Crepeau, D. Gottesman, A. Smith, A. Tapp, "Authentication of Quantum Messages," Proc. 43rd IEEE

Symposium on the Foundations of Computer Science, 449-458 (2002), full version quant-ph/0205128.• [BCJL] Gilles Brassard, Claude Crépeau, Richard Jozsa, Denis Langlois: A Quantum Bit Commitment Scheme Provably Unbreakable by

both Parties FOCS 1993: 362-371.• [BH05] Michael Ben-Or, Avinatan Hassidim: Fast quantum byzantine agreement. STOC 2005: 481-485• [BHLMO'05] Michael Ben-Or, Michal Horodecki, Debbie W. Leung, Dominic Mayers, Jonathan Oppenheim: The Universal Composable

Security of Quantum Key Distribution. TCC 2005: 386-406. quant-ph/0409078• [BM'05] Michael Ben-Or, Dominic Mayers. General Security Definition and Composability for Quantum & Classical Protocols.

quant-ph/0409062.• [CDMS] Claude Crépeau, Paul Dumais, Dominic Mayers, Louis Salvail: Computational Collapse of Quantum State with Application to

Oblivious Transfer. TCC 2004: 374-393.• [CGS02] C. Crepeau, D. Gottesman, A. Smith, "Secure Multi-Party Quantum Computation," Proc. 34th ACM Symposium on the Theory of

Computing, 643-652 (New York, NY, ACM Press, 2002), quant-ph/0206138. • [CHTW04] R. Cleve, P. Høyer, B. Toner, and J. Watrous, Consequences and Limits of Nonlocal Strategies, Proceedings of the 19th IEEE

Annual Conference on Computational Complexity (CCC 2004), pp. 236- 249 (2004).• [CST'05] C. Crepeau, J.-R. Simard, A. Tapp. Classical and quantum strategies for two-prover bit commitments. Manuscrip, 2005.• [DFS] Ivan Damgård, Serge Fehr, Louis Salvail: Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks.

CRYPTO 2004: 254-272• [E91] Artur K. Ekert. Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 67, 661–663 (1991).• [G] D. Gottesman, "Uncloneable Encryption," Proc. 6th International Conf. on Quantum Communication, Measurement, and Computing,

eds. J. H. Shapiro and O. Hirota, pp. 405-410 (Princeton, NJ, Rinton Press, 2003), full version Quantum Information and Computation 3, No. 6, 581-602 (2003), quant-ph/0210062.

• [K'03] Hirotada Kobayashi: Non-interactive Quantum Perfect and Statistical Zero-Knowledge. ISAAC 2003: 178-188.• [KMR] Robert Koenig, Ueli Maurer, and Renato Renner. On the Power of Quantum Memory. IEEE Transaction on Information Theory, vol.

51, no. 7, pp. 2391-2401, Jul 2005, eprint archive: http://arxiv.org/abs/quant-ph/0305154.• [LC99] Hoi-Kwong Lo, H. F. Chau. Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances. Science 26 March

1999: Vol. 283. no. 5410, pp. 2050 - 2056• [M,LC] D. Mayers. Unconditonally secure quantum bit commitment is impossible, Phys. Rev. Lett. 78, (1997) 3414-3417. --and-- H.-K. Lo,

H. F. Chau. Why Quantum Bit Commitment And Ideal Quantum Coin Tossing Are Impossible. Physica D120 (1998) 177-187. quant-ph/9711065.

• [OTU'00] Tatsuaki Okamoto, Keisuke Tanaka, Shigenori Uchiyama: Quantum Public-Key Cryptosystems. CRYPTO 2000: 147-165.• [S'94] Peter W. Shor: Algorithms for Quantum Computation: Discrete Logarithms and Factoring FOCS 1994: 124-134.• [W'05] J. Watrous. Zero-knowledge against quantum attacks. arXiv.org e-Print quant-ph/0511020, 2005.

Page 42: Evolving Notions of Security for Quantum Protocols Adam Smith Weizmann Institute of Science asmith Caltech Workshop on Security.

Thank you

Questions?

This talk to be posted on:http://theory.csail.mit.edu/~asmith