Classical Cryptographic Protocols in a Quantum World
نویسندگان
چکیده
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If we accept that quantum information processing is the most realistic model of physically feasible computation, then we must ask: what classical protocols remain secure against quantum attackers? Our main contribution is showing the existence of classical two-party protocols for the secure evaluation of any polynomial-time function under reasonable computational assumptions (for example, it suffices that the learning with errors problem be hard for quantum polynomial time). Our result shows that the basic two-party feasibility picture from classical cryptography remains unchanged in a quantum world. ∗A preliminary version of this work appeared in Advances in Cryptology CRYPTO 2011. †Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, U.S.A. ‡Partially supported by National Science Foundation award CCF-0747274 and by the National Security Agency (NSA) under Army Research Office (ARO) contract number W911NF-08-1-0298. §Partially supported by National Science Foundation award CCF-0747294. ¶Department of Combinatorics & Optimization and Institute for Quantum Computing, University of Waterloo, Canada. Partially supported by Cryptoworks21, NSERC, ORF and US ARO. Most work was conducted while at the Pennsylvania State University. 1 ar X iv :1 50 7. 01 62 5v 1 [ qu an tph ] 6 J ul 2 01 5
منابع مشابه
Cryptographic Protocols under Quantum Attacks
The realm of this thesis is cryptographic protocol theory in the quantum world. We study the security of quantum and classical protocols against adversaries that are assumed to exploit quantum effects to their advantage. Security in the quantum world means that quantum computation does not jeopardize the assumption, underlying the protocol construction. But moreover, we encounter additional set...
متن کاملWhy classical certification is impossible in a quantum world
I give a simple proof that it is impossible to guarantee the classicality of inputs into any mistrustful quantum cryptographic protocol. The argument illuminates the impossibility of unconditionally secure quantum implementations of essentially classical tasks such as bit commitment with a certified classical committed bit, classical oblivious transfer, and secure classical multi-party computat...
متن کاملFeasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography
Since the introduction of conjugate coding by Wiesner in the 70’s of the last century , quantum cryptography 2,3,4,5,6,7 has developed into an increasingly active area of applied research and technology, as well as a powerful tool to exploit the quantum. From the first realization at IBM’s Yorktown Heights laboratory 5 to its implementation across Lake Geneva 6 and various other spots around th...
متن کاملError tolerance of two-basis quantum key-distribution protocols using qudits and two-way classical communication
We investigate the error tolerance of quantum cryptographic protocols using d-level systems. In particular, we focus on prepare-and-measure schemes that use two mutually unbiased bases and a key-distillation procedure with two-way classical communication. For arbitrary quantum channels, we obtain a sufficient condition for secret-key distillation which, in the case of isotropic quantum channels...
متن کاملComposing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple quantum-information-theoretic conditions which must be satisfied by the protocol to be secure. The conditions are uniquely determined by the ideal functionality F defining the cryptographic task to be implemented. We t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2011