On the power of non-adaptive quantum chosen-ciphertext attacks - - PowerPoint PPT Presentation

on the power of non adaptive quantum chosen ciphertext
SMART_READER_LITE
LIVE PREVIEW

On the power of non-adaptive quantum chosen-ciphertext attacks - - PowerPoint PPT Presentation

On the power of non-adaptive quantum chosen-ciphertext attacks joint work with Gorjan Alagic (UMD, NIST), Stacey Jeffery (QuSoft, CWI), and Maris Ozols (QuSoft, UvA) Alexander Poremba August 29, 2018 Heidelberg University; California Institute


slide-1
SLIDE 1

On the power of non-adaptive quantum chosen-ciphertext attacks

joint work with Gorjan Alagic (UMD, NIST), Stacey Jeffery (QuSoft, CWI), and Maris Ozols (QuSoft, UvA)

Alexander Poremba August 29, 2018

Heidelberg University; California Institute of Technology QCrypt 2018

slide-2
SLIDE 2

Cryptography + Quantum Computation

1

slide-3
SLIDE 3

Cryptography + Quantum Computation

1

slide-4
SLIDE 4

Cryptography + Quantum Computation

1

slide-5
SLIDE 5

Security in a quantum world

slide-6
SLIDE 6

Security in a quantum world

What makes a classical scheme Π = (KeyGen, Enc, Dec) ”quantum-secure”?

  • ciphertexts reveal no information about plaintexts (should look ”indistinguishable”)
  • assumption that adversaries are quantum, i.e. run in quantum polynomial-time (QPT).

Definition: (Indistinguishability - IND) Π has indistinguishable ciphertexts if ∀QPT A: Pr[A wins IndGame] = 1/2 + negl(n)

2

slide-7
SLIDE 7

Non-adaptive quantum chosen-ciphertext attacks (AJOP’18)

What if A gets lunch-time access to encryption & decryption?( = ⇒ chosen-ciphertext attack) Definition: (Non-adaptive quantum chosen-ciphertext security) Π is IND-QCCA1 secure if ∀QPT A: Pr[A wins IndGame] = 1/2 + negl(n)

3

slide-8
SLIDE 8

Non-adaptive quantum chosen-ciphertext attacks (AJOP’18)

What if A gets lunch-time access to encryption & decryption?( = ⇒ chosen-ciphertext attack) Definition: (Non-adaptive quantum chosen-ciphertext security) Π is IND-QCCA1 secure if ∀QPT A: Pr[A wins IndGame] = 1/2 + negl(n)

3

slide-9
SLIDE 9

A secure encryption scheme

slide-10
SLIDE 10

Quantum random access codes (Ambainis et al.’08)

4

slide-11
SLIDE 11

Quantum random access codes (Ambainis et al.’08)

Lemma: (AJOP’18) Average bias on message length N = 2n and poly(n)-sized quantum state is O(2−n/2 poly(n)).

4

slide-12
SLIDE 12

A secure symmetric-key encryption scheme

Theorem: (AJOP’18) The construction Π = (KeyGen, Enc, Dec) with QPRF {fk : {0, 1}n → {0, 1}n} is IND-QCCA1:

  • KeyGen: sample a key k

$

← − {0, 1}n

  • Enck(m) = (r, fk(r) ⊕ m), for r

$

← − {0, 1}n

  • Deck(r, c) = c ⊕ fk(r)

quantum-secure pseudorandom function (QPRF)

5

slide-13
SLIDE 13

A secure symmetric-key encryption scheme

Theorem: (AJOP’18) The construction Π = (KeyGen, Enc, Dec) with QPRF {fk : {0, 1}n → {0, 1}n} is IND-QCCA1:

  • KeyGen: sample a key k

$

← − {0, 1}n

  • Enck(m) = (r, fk(r) ⊕ m), for r

$

← − {0, 1}n

  • Deck(r, c) = c ⊕ fk(r)

quantum-secure pseudorandom function (QPRF)

Proof idea. Fix a QPT adversary A.

  • 1. Replace fk with a random function f (by the QPRF assumption)
  • 2. QRAC reduction: Use A against IND-QCCA1 security to construct a code.

By Lemma, the advantage is ǫ = O(2−n/2 poly(n)).

5

slide-14
SLIDE 14

Learning with Errors

slide-15
SLIDE 15

Learning with Errors (Regev ’05)

Learning with Errors (LWE)

  • primary basis of hardness for

post-quantum cryptography

  • allows for PKE, FHE, QPRFs, . . .

s ❛ ❛ s ❛ ❛ s ❛ ❛ s s ❛ ❛ s ❛ ❛ s

6

slide-16
SLIDE 16

Learning with Errors (Regev ’05)

Learning with Errors (LWE)

  • primary basis of hardness for

post-quantum cryptography

  • allows for PKE, FHE, QPRFs, . . .

Search problem: Recover a secret string s ∈ Zn

q from a

set of noisy linear equations modulo q. ❛1

$

← − Zn

q;

c1 = ❛1, s + e1 ❛2

$

← − Zn

q;

c2 = ❛2, s + e2 . . . ❛m

$

← − Zn

q;

cm = ❛m, s + em, s ❛ ❛ s ❛ ❛ s

6

slide-17
SLIDE 17

Learning with Errors (Regev ’05)

Learning with Errors (LWE)

  • primary basis of hardness for

post-quantum cryptography

  • allows for PKE, FHE, QPRFs, . . .

Search problem: Recover a secret string s ∈ Zn

q from a

set of noisy linear equations modulo q. ❛1

$

← − Zn

q;

c1 = ❛1, s + e1 ❛2

$

← − Zn

q;

c2 = ❛2, s + e2 . . . ❛m

$

← − Zn

q;

cm = ❛m, s + em, Symmetric-key encryption using LWE

  • KeyGen: choose key s

$

← − Zn

q.

  • Encs(b) = (❛, ❛, s + e + b⌊q/2⌋)
  • Decs(❛, c) = 0, if |c − ❛, s| ≤

q

4

  • , else 1.

6

slide-18
SLIDE 18

Learning with Errors (Regev ’05)

Learning with Errors (LWE)

  • primary basis of hardness for

post-quantum cryptography

  • allows for PKE, FHE, QPRFs, . . .

Search problem: Recover a secret string s ∈ Zn

q from a

set of noisy linear equations modulo q. ❛1

$

← − Zn

q;

c1 = ❛1, s + e1 ❛2

$

← − Zn

q;

c2 = ❛2, s + e2 . . . ❛m

$

← − Zn

q;

cm = ❛m, s + em, Symmetric-key encryption using LWE

  • KeyGen: choose key s

$

← − Zn

q.

  • Encs(b) = (❛, ❛, s + e + b⌊q/2⌋)
  • Decs(❛, c) = 0, if |c − ❛, s| ≤

q

4

  • , else 1.

b = 0 b = 1 ⌊q/2⌋

6

slide-19
SLIDE 19

Learning with Errors (Regev ’05)

Learning with Errors (LWE)

  • primary basis of hardness for

post-quantum cryptography

  • allows for PKE, FHE, QPRFs, . . .

Search problem: Recover a secret string s ∈ Zn

q from a

set of noisy linear equations modulo q. ❛1

$

← − Zn

q;

c1 = ❛1, s + e1 ❛2

$

← − Zn

q;

c2 = ❛2, s + e2 . . . ❛m

$

← − Zn

q;

cm = ❛m, s + em, Symmetric-key encryption using LWE

  • KeyGen: choose key s

$

← − Zn

q.

  • Encs(b) = (❛, ❛, s + e + b⌊q/2⌋)
  • Decs(❛, c) = 0, if |c − ❛, s| ≤

q

4

  • , else 1.

This talk:

  • new quantum attack on plain LWE encryption
  • attack uses a single quantum decryption
  • classical attack: Ω(n log q)
  • quantum attack: O(1).

6

slide-20
SLIDE 20

Quantum attack

slide-21
SLIDE 21

Bernstein-Vazirani for linear rounding (AJOP’18)

Linear rounding function with key s ∈ Zn

q,

Oracle: ULRFs : |x|b → |①|b ⊕ LRFs(①) LRFs(①) :=

  • if |①, s| ≤ ⌊ q

4⌋

1

  • therwise

Algorithm: 1 √qn

  • x∈Zn

q

|① ⊗ |0−|1

√ 2

1 √qn

  • x∈Zn

q

(−1)LRFs(x)|① 1 qn

  • y,x∈Zn

q

(−1)LRFs(x)e

2πi q x,y|②

7

slide-22
SLIDE 22

Bernstein-Vazirani for linear rounding (AJOP’18)

Linear rounding function with key s ∈ Zn

q,

Oracle: ULRFs : |x|b → |①|b ⊕ LRFs(①) LRFs(①) :=

  • if |①, s| ≤ ⌊ q

4⌋

1

  • therwise

Success probability: Pr[② = s] ≈ 4/π2. Algorithm: 1 √qn

  • x∈Zn

q

|① ⊗ |0−|1

√ 2

1 √qn

  • x∈Zn

q

(−1)LRFs(x)|① 1 qn

  • y,x∈Zn

q

(−1)LRFs(x)e

2πi q x,y|②

7

slide-23
SLIDE 23

Our results (AJOP’18)

IND-QCCA1 (AJOP’18) IND-QCCA2 (BZ’13) IND-QCPA (BJ’15)

Non-adative quantum chosen-ciphertext attacks:

  • 1. Formal security definition (IND-QCCA1)
  • ”half-way” between existing security notions
  • 2. A secure symmetric-key encryption scheme:

→ QPRF construction

  • uses quantum-secure pseudorandom functions
  • proof technique: quantum random access codes
  • 3. Quantum attack on Learning with Errors encryption
  • Bernstein-Vazirani algorithm for linear rounding

8

slide-24
SLIDE 24

Questions?

8