Secure Identification In The Isolated Qubits Model

نویسنده

  • Filippos Vogiatzian
چکیده

Oblivious transfer is a powerful cryptographic primitive that is complete for secure multi-party computation. In oblivious transfer protocols a user sends one or more messages to a receiver, while the sender remains oblivious as to which messages have been received. Protocols for oblivious transfer cannot exist in a classical or fully-quantum world, but can be implemented by restricting the users' power. The isolated qubits model is a cryptographic model in which users are restricted to single-qubit operations and are not allowed to use entangling operations. Furthermore, all parties are allowed to store qubits for a long time before measuring them. In this model, a secure single-bit one-out-of-two randomised oblivious transfer protocol was recently presented by Liu. Motivated by this result, we construct a protocol for secure string one-out-of-two randomised oblivious transfer by simplifying and generalising the existing proof. We then study for the first time interactive protocols for more complex two-party functionalities in this model based on the security of our construction. In order to guarantee the composability of our construction, users are restricted to measurement at the end of each sub-protocol. It is then possible to construct secure one-out-of-two and one-out-of-k oblivious transfer protocols in the isolated qubits model. Moreover, we study secure password-based identification, where a user identifies himself to another user by evaluating the equality function on their inputs, or passwords. We use the oblivious transfer constructions mentioned above as sub-protocols to construct a secure identification protocol. Finally, we prove that constructing a secure identification protocol non-interactively is impossible , even using oblivious transfer. Acknowledgements First of all, I would like to thank my supervisor, Christian Schaffner for introducing me to world of quantum cryptography and for giving me the opportunity to work with him, for his valuable contribution throughout the project, the long hours he spent on trying to solve the riddles of isolated qubits. Furthermore, I want to thank Yi-Kai Liu for helpful discussions and suggestions as well as reading through our first try to tackle his model. I would also like to thank the examination committee for taking the time and effort of reading this thesis. Last but not least, I want to thank my family and friends for their motivation and support during the last year. ii Contents Abstract i Acknowledgements ii Contents iii Abbreviations vi 1 Introduction 1 1.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Building one-time memories from isolated qubits

One-time memories (OTM’s) are a simple type of tamper-resistant cryptographic hardware, which can be used to implement many forms of secure computation, such as one-time programs. Here we investigate the possibility of building OTM’s using isolated qubits — qubits that can only be accessed using local operations and classical communication (LOCC). Isolated qubits can be implemented using curren...

متن کامل

Single-Shot Security for One-Time Memories in the Isolated Qubits Model

One-time memories (OTM’s) are simple, tamper-resistant cryptographic devices, which can be used to implement sophisticated functionalities such as one-time programs. Can one construct OTM’s whose security follows from some physical principle? This is not possible in a fully-classical world, or in a fully-quantum world, but there is evidence that OTM’s can be built using “isolated qubits” — qubi...

متن کامل

Improving the Security of Quantum Protocols via Commit-and-Open

We consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general “compiler” improving the security of such protocols: if the original protocol is secure against an “almost honest” adversary, then the compiled protocol is secure against an arbitrary computationally bounded (quantum) adversary. The compilation preser...

متن کامل

Cryptography from noisy storage.

We show how to implement cryptographic primitives based on the realistic assumption that quantum storage of qubits is noisy. We thereby consider individual-storage attacks; i.e., the dishonest party attempts to store each incoming qubit separately. Our model is similar to the model of bounded-quantum storage; however, we consider an explicit noise model inspired by present-day technology. To il...

متن کامل

Secure Identification and QKD in the Bounded-Quantum-Storage Model

We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w as possible, namely the adversary can exclude at most one possible password for each execution of the scheme. We propose a solution in the bounded-quantumstorage model, where U and S may exchange qubits, and a dishone...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1510.07118  شماره 

صفحات  -

تاریخ انتشار 2015