60
Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September 2015

Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

Embed Size (px)

Citation preview

Page 1: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

Quantum Cryptography

Christian SchaffnerILLC, University of Amsterdam

Centrum Wiskunde & Informatica

Logic, Language and ComputationMonday, 21 September 2015

Page 2: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

2

1969: Man on the Moon

NASA

The Great Moon-Landing Hoax?

How can you prove that you are at a specific location?http://www.unmuseum.org/moonhoax.htm

Page 3: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

3 What will you Learn from this Talk?

Classical Cryptography Quantum Computation & Teleportation Position-Based Cryptography Garden-Hose Model

Page 4: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

4Classical Cryptography 3000 years of fascinating history until 1970: private communication was the only goal

Page 5: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

5Modern Cryptography is everywhere! is concerned with all settings where people do not trust

each other

Page 6: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

6Secure Encryption

k = ?

Alice

Bob

Goal: Eve does not learn the message Setting: Alice and Bob share a secret key k

Evek = 0101 1011 k = 0101

1011

m = 0000 1111m = “I love you”

Page 7: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

eXclusive OR (XOR) Functionx y x © y0 0 01 0 10 1 11 1 0

Some properties: 8 x : x © 0 = x 8 x : x © x = 0

7

) 8 x,y : x © y © y = x

Page 8: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

One-Time Pad Encryption

Alice

Bob

Goal: Eve does not learn the message Setting: Alice and Bob share a key k Recipe:

Is it secure?

Eve

x y x © y0 0 0

0 1 1

1 0 1

1 1 0k = 0101 1011

m = 0000 1111

c = m © k = 0101 0100 c © k = 0000 1111c © k = m © k © k = m © 0 = m

c = 0101 0100

k = 0101 1011

m = 0000 1111 c = m © k = 0101 0100 m = c © k = 0000 1111

k = 0101 1011 k = 0101 1011

k = ?

8

Page 9: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

Perfect Security

Alice

Bob

Given that c = 0101 0100, is it possible that m = 0000 0000 ?

Yes, if k = 0101 0100. is it possible that m = 1111 1111 ?

Yes, if k = 1010 1011. it is possible that m = 0101 0101 ?

Yes, if k = 0000 0001 In fact, every m is possible. Hence, the one-time pad is perfectly secure!

Eve

x y x © y0 0 0

0 1 1

1 0 1

1 1 0

m = ?

k = ?k = ?

c = m © k = 0101 0100 m = c © k = ?

k = ?

9

Page 10: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

Problems With One-Time Pad

Alice

Bob

The key has to be as long as the message (Shannon’s theorem) The key can only be used once.

Eve

m = 0000 1111

k = 0101 1011 k = 0101 1011

c = m © k = 0101 0100 m = c © k = 0000 1111

k = ?

10

Page 11: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

11Information Theory 6 ECTS MoL course, given in 2nd block: Nov/Dec 2015 mandatory for Logic & Computation track first lecture: Tuesday, 28 October 2015, 9:00, G3.13 http://homepages.cwi.nl/~schaffne/courses/inftheory/2015/

Page 12: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

Problems With One-Time Pad

Alice

Bob

The key has to be as long as the message (Shannon’s theorem) The key can only be used once. In practice, other encryption schemes (such as AES) are used

which allow to encrypt long messages with short keys. One-time pad does not provide authentication:

Eve can easily flip bits in the message

Eve

m = 0000 1111

k = 0101 1011 k = 0101 1011

c = m © k = 0101 0100 m = c © k = 0000 1111

k = ?

12

Page 13: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

Symmetric-Key Cryptography

Alice

Encryption insures secrecy: Eve does not learn the message, e.g. one-time pad

Authentication insures integrity: Eve cannot alter the message

General problem: players have to exchange a key to start with

Eve

Bob

13

Page 14: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

14Introduction to Modern Cryptography 6 ECTS MoL course, usually given in Feb/March 2016: probably not http://homepages.cwi.nl/~schaffne/courses/crypto/2015/

Page 15: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

15 What to Learn from this Talk?

Classical Cryptography Quantum Computing & Teleportation Position-Based Cryptography Garden-Hose Model

Page 16: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

16Quantum Bit: Polarization of a Photonqubit as unit vector in C2

Page 17: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

17Qubit: Rectilinear/Computational Basis

Page 18: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

18Detecting a Qubit

Bob

no photons: 0

Alice

Page 19: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

19Measuring a Qubit

Bob

no photons: 0photons: 1

with prob. 1 yields 1measurement:

0/1

Alice

Page 20: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

20Diagonal/Hadamard Basis

with prob. ½ yields 0

with prob. ½ yields 1

Measurement:

0/1=

Page 21: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

21Illustration of a Superposition

with prob. ½ yields 0

with prob. ½ yields 1

Measurement:

0/1=

Page 22: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

22Illustration of a Superposition

==

Page 23: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

23Quantum Mechanics

with prob. 1 yields 1Measurements:

+ basis

£ basis

with prob. ½ yields 0

with prob. ½ yields 1

0/1

0/1

Page 24: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

Wonderland of Quantum Mechanics

Page 25: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

25Quantum is Real!

25

generation of random numbers

(diagram from idQuantique white paper)

no quantum computation, only quantum communication required

50%

50%

Page 26: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

26 Possible to build in theory, no fundamental theoretical obstacles have been found yet.

Canadian company “D-Wave” claims to have build a quantum computer with 1024 qubits. Did they?

2014: Martinis group “acquired” by Google 2014/15: 135+50 Mio € investment in QuTech centre in

Delft 2015: QuSoft center in Amsterdam

Can We Build Quantum Computers?

Martinis group (UCSB)9 qubits

Page 27: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

27No-Cloning Theorem

??

?

quantum operations: U

Proof: copying is a non-linear operation

Page 28: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

Quantum Key Distribution (QKD)Alice

Bob

Eve security against unrestricted eavesdroppers:

quantum states are unknown to Eve, she cannot copy them honest players can check whether Eve interfered

technically feasible: no quantum computation required, only quantum communication

[Bennett Brassard 84]

Page 29: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

29EPR Pairs

prob. ½ : 0 prob. ½ : 1

prob. 1 : 0

[Einstein Podolsky Rosen 1935]

“spukhafte Fernwirkung” (spooky action at a distance) EPR pairs do not allow to communicate

(no contradiction to relativity theory) can provide a shared random bit

EPR magic!

Page 30: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

30Quantum Teleportation[Bennett Brassard Crépeau Jozsa Peres Wootters 1993]

does not contradict relativity theory teleported state can only be recovered

once the classical information ¾ arrives

?

[Bell]

? ?

Page 31: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

31 What to Learn from this Talk?

Classical Cryptography

Quantum Computing & Teleportation Position-Based Cryptography Garden-Hose Model

Page 32: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

32

How to Convince Someone of Your Presence at a Location

The Great Moon Landing Hoax

http://www.unmuseum.org/moonhoax.htm

Page 33: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

33Position-Based Cryptography

Possible Applications: Launching-missile command comes

from within the military headquarters Talking to the correct country Pizza-delivery problem /

avoid fake calls to emergency services …

Can the geographical location of a player be used as sole cryptographic credential ?

Page 34: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

34Position-Based Cryptography

http://nos.nl/op3/artikel/692138-gamer-krijgt-swatteam-in-zn-nek-swatting.html

https://youtu.be/TiW-BVPCbZk?t=117

Page 35: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

35

Basic task: Position Verification

Prover wants to convince verifiers that she is at a particular position

no coalition of (fake) provers, i.e. not at the claimed position, can convince verifiers

assumptions: communication at speed of light instantaneous computation verifiers can coordinate

Verifier1 Verifier2Prover

Page 36: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

36

Position Verification: First Try

Verifier1 Verifier2Prover

time

distance bounding [Brands Chaum ‘93]

Page 37: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

37

Position Verification: Second Try

Verifier1 Verifier2Prover

position verification is classically impossible ![Chandran Goyal Moriarty Ostrovsky: CRYPTO ’09]

Page 38: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

38

Equivalent Attacking Game

independent messages mx and my copying classical information this is impossible quantumly

Page 39: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

39

Position Verification: Quantum Try[Kent Munro Spiller 03/10]

Let us study the attacking game

?

?

?

Page 40: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

40

?

Attacking Game

impossible but possible with entanglement!!

?? ?

?

Page 41: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

41

?

Entanglement attack

done if b=1

[Bell]

?

?

Page 42: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

42

?

Entanglement attack

the correct person can reconstruct the qubit in time! the scheme is completely broken

[Bell]

?

?[Bell]

Page 43: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

43more complicated schemes?

Different schemes proposed by Chandran, Fehr, Gelles, Goyal, Ostrovsky [2010] Malaney [2010] Kent, Munro, Spiller [2010] Lau, Lo [2010]

Unfortunately they can all be broken! general no-go theorem [Buhrman, Chandran,

Fehr, Gelles, Goyal, Ostrovsky, S 2014]

Page 44: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

46No-Go Theorem

Any position-verification protocol can be broken using an exponential number of EPR-pairs

Question: is this optimal? Does there exist a protocol such that:

any attack requires many EPR-pairs honest prover and verifiers efficient

Page 45: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

47

Single-Qubit Protocol: SQPf[Kent Munro Spiller 03/10]

if f(x,y)=0?

?

?

if f(x,y)=1

efficiently computable

Page 46: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

48

?

Attacking Game for SQPf

Define E(SQPf) := minimum number of EPR pairs required for attacking SQPf

? ?

if f(x,y)=0 if f(x,y)=1

x y

Page 47: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

49 What to Learn from this Talk?

Classical Cryptography

Quantum Computing & Teleportation

Position-Based Cryptography Garden-Hose Model

http://arxiv.org/abs/1109.2563Buhrman, Fehr, S, Speelman

Page 48: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

share s waterpipes

50

The Garden-Hose Model

Page 49: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

The Garden-Hose Model

based on their inputs, players connect pipes with pieces of hose Alice also connects a water tap

51

if water exits @ Alice if water exits @ Bob

Page 50: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

Garden-Hose complexity of f:GH(f) := minimum number of pipes needed to compute f

52

if water exits @ Alice if water exits @ Bob

The Garden-Hose Model

Page 51: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

Demonstration: Inequality on Two Bits53

Page 52: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

GH( Inequality ) · demonstration: 3n challenge: 2n + 1 (first student to email me solution wins)

world record: ~1.359n [Chiu Szegedy et al 13]GH( Inequality ) ¸ n [Pietrzak ‘11]

n-Bit Inequality Puzzle54

Page 53: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

Relationship betweenE(SQPf) and GH(f)

Page 54: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

GH(f) ¸ E(SQPf)Garden-Hose Attacking Game

teleport teleportteleport

teleport

?

Page 55: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

GH(f) ¸ E(SQPf)Garden-Hose Attacking Game

teleport teleportteleport

teleport

?

y, Bob’s telep. keys

x, Alice’s telep. keys

using x & y, can follow the water/qubit correct water/qubit using all

measurement outcomes

Page 56: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

58

last slide: GH(f) ¸ E(SQPf) The two models are not equivalent:

exists f such that GH(f) = n , but E(SQPf) · log(n)

Quantum garden-hose model: give Alice & Bob also entanglement research question: are the models now equivalent?

GH(f) = E(SQPf) ?

Page 57: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

59Garden-Hose Complexity Theory every f has GH(f) · 2n+1

if f in logspace, then GH(f) · polynomial efficient f & no efficient attack ) P L

exist f with GH(f) exponential (counting argument) for g 2 {equality, IP, majority}: GH(g) ¸ n / log(n)

techniques from communication complexity

Many open problems!

Page 58: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

60

What Have You Learned from this Talk?

Classical Cryptography

Quantum Computing & Teleportation

Page 59: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

61

What Have You Learned from this Talk?

No-Go Theorem Impossible unconditionally, but attack requires

unrealistic amounts of resources

Garden-Hose Model model of communication complexity

Position-Based Cryptography

Page 60: Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September

62 Take on the crypto challenge! GH( Inequality ) = 2n + 1 pipes

the first person to tell me ([email protected]) the protocol wins:

course “Information Theory” see you in the next block on 28 October 2015!