Composable security in relativistic quantum cryptography
نویسندگان
چکیده
Relativistic protocols have been proposed to overcome some impossibility results in classical and quantum cryptography. In such a setting, one takes the location of honest players into account, and uses the fact that information cannot travel faster than the speed of light to limit the abilities of dishonest agents. For example, various relativistic bit commitment protocols have been proposed [1, 2]. Although it has been shown that bit commitment is sufficient to construct oblivious transfer [3] and thus multiparty computation, composing specific relativistic protocols in this way is known to be insecure [4, Appendix A]. A composable framework is required to perform such a modular security analysis of construction schemes, but no known frameworks can handle models of computation in Minkowski space. By instantiating the systems model from the Abstract Cryptography framework [5] with causal boxes [6], we obtain such a composable framework, in which messages are assigned a location in Minkowski space (or superpositions thereof). This allows us to analyze relativistic protocols, and derive novel possibility and impossibility results. We show that (1) coin flipping can be constructed from the primitive channel with delay, (2) biased coin flipping, bit commitment and channel with delay are all impossible without further assumptions, and (3) it is impossible to improve a channel with delay (Fig. 1). This implies in particular non-composability of all proposed relativistic bit commitment protocols, as well as non-composability of (quantum, but non-relativistic) biased coin flipping protocols [7].
منابع مشابه
Universally Composable Privacy Amplification Against Quantum Adversaries
Privacy amplification is the art of shrinking a partially secret string Z to a highly secret key S. We show that, even if an adversary holds quantum information about the initial string Z, the key S obtained by two-universal hashing is secure, according to a universally composable security definition. Additionally, we give an asymptotically optimal lower bound on the length of the extractable k...
متن کاملComposable Privacy Amplification Against Quantum Adversaries ∗
Privacy amplification is the art of shrinking a partially secret string Z to a highly secret key S. We show that, even if an adversary holds quantum information about the initial string Z, the key S obtained by two-universal hashing is secure, according to a universally composable security definition. Additionally, we give an asymptotically optimal lower bound on the length of the extractable k...
متن کاملA Paradox of Quantum Universal Composability
Security of cryptographic protocols under composition is a major concern in cryptography. For classical cryptography Canetti gave a definition of security implying universal composability [Can01]. A protocol proven secure in that sense may replace ideal functionalities in arbitrary applications preserving the overall security of the application. In this contribution we sketch the modifications ...
متن کامل0 A Simple Proof of the Unconditional Security of Relativistic Quantum Cryptography
A simple proof of the unconditional security of a relativistic quantum cryptosystem based on orthogonal states is proposed. Restrictions imposed by special relativity allow to substantially simplify the proof compared with the non-relativistic cryptosystems involving non-orthogonal states. Important for the proposed protocol is the spatio-temporal structure of the quantum states which is actual...
متن کاملUniversally-composable privacy amplification from causality constraints
We consider schemes for secret key distribution which use as a resource correlations that violate Bell inequalities. We provide the first security proof for such schemes, according to the strongest notion of security, the so-called universally composable security. Our security proof does not rely on the validity of quantum mechanics, it solely relies on the impossibility of arbitrarily fast sig...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1708.00433 شماره
صفحات -
تاریخ انتشار 2017