Pseudorandom States, No-Cloning Pseudorandom States, No-Cloning - - PowerPoint PPT Presentation

pseudorandom states no cloning pseudorandom states no
SMART_READER_LITE
LIVE PREVIEW

Pseudorandom States, No-Cloning Pseudorandom States, No-Cloning - - PowerPoint PPT Presentation

Pseudorandom States, No-Cloning Pseudorandom States, No-Cloning Theorems and Quantum Money Theorems and Quantum Money Zhengfeng Ji (UTS:QSI) QCrypt 2018, Shanghai 1 . 1 A Joint Work With A Joint Work With Yi-Kai Liu Fang Song (NIST and


slide-1
SLIDE 1

Pseudorandom States, No-Cloning Pseudorandom States, No-Cloning Theorems and Quantum Money Theorems and Quantum Money

Zhengfeng Ji (UTS:QSI) QCrypt 2018, Shanghai

1 . 1

slide-2
SLIDE 2

Yi-Kai Liu (NIST and UMD) Fang Song (PSU -> TAMU)

A Joint Work With A Joint Work With

1 . 2

slide-3
SLIDE 3

Pseudorandomness Pseudorandomness

One of the foundations of modern cryptography

2 . 1

slide-4
SLIDE 4

Pseudorandomness in Modern Cryptography Pseudorandomness in Modern Cryptography

Pseudorandom objects look random to computationally bounded adversaries Computational indistinguishability Pseudorandom generators (PRGs) PRGs exist if one-way functions (OWFs) exist

[Håstad, Impagliazzo, Levin, and Luby 1999]

g : {0, 1 → {0, 1 }l }2l

2 . 2

slide-5
SLIDE 5

Pseudorandom Functions and Permutations Pseudorandom Functions and Permutations

A random function assigns a random value from the range to each input from domain . Pseudorandom functions (PRFs) A function is pseudorandom if for any polynomial-time randomized algorithm Pseudorandom permutations (PRPs) Stream ciphers, block ciphers, message authentication, …

f : X → Y Y X PRF : K × X → Y A [ ( ) = 1] − [ ( ) = 1] = negl(κ). ∣ ∣ ∣ Pr

k←K APRFk 1κ

Pr

f←Y X Af 1κ

∣ ∣ ∣

2 . 3

slide-6
SLIDE 6

Pseudorandomness in the Quantum Era Pseudorandomness in the Quantum Era

True randomness from quantum mechanics Prepare state and measure in the computational basis Device-independent randomness expansion and amplication Why do we need to care about pseudorandomness in quantum computing?

|+⟩ = (|0⟩ + |1⟩)/ 2 – √

2 . 4

slide-7
SLIDE 7

The problem of efciency The number of random functions with n-bit input/output is and we need exponentially many bits simply to specify a truly random function Similar argument applies to the space of quantum states of qubits Pseudorandomness is not a weaker form randomness; it is a different variant of randomness, a combinatorial construction

2n2n n

2 . 5

slide-8
SLIDE 8

Pseudorandomness Against Quantum Attacks Pseudorandomness Against Quantum Attacks

Stronger assumption: quantum OWFs, functions that are easy to compute classically, but hard to invert even quantumly Security proofs Quantum-secure PRGs exist assuming quantum OWFs Quantum-secure PRFs exist assuming quantum OWFs

[Zhandry 2012]

Quantum-secure PRPs exist assuming quantum OWFs

[Zhandry 2016], [Song 2017, Blog post at ]

http://qcc.fangsong.info/2017-06-quantumprp/

2 . 6

slide-9
SLIDE 9

Pseudorandom Quantum Objects Pseudorandom Quantum Objects

From classical objects to quantum objects

3 . 1

slide-10
SLIDE 10

Pseudorandom Quantum States (PRS's) Pseudorandom Quantum States (PRS's)

Truly random quantum states and Haar measure on state space How to dene PRS? A family of states is pseudorandom if it is computationally indistinguishable from the maximally mixed state?

[Chen, Chung, Lai, Vadhan and Wu 2017]

Missing properties: no-cloning, entanglement, … How about the random bit strings?

{|ϕ⟩k}k∈K |x⟩⟨x| = 1 N ∑

x∈{0,1}n

I N

3 . 2

slide-11
SLIDE 11

A keyed family of quantum states is pseudorandom, if the following two conditions hold:

  • 1. (Efcient generation). There is an efcient quantum

algorithm such that for all , .

  • 2. (Pseudorandomness). For any efcient quantum algorithm

and any number of copies , is negligible. The number of copies matters quantumly.

{| ⟩ ∈ S(H) ϕk }k∈K G k ∈ K G(k) = | ⟩ ϕk A m ∈ poly(κ) [A(| ) = 1] − [A(|ψ ) = 1] ∣ ∣ ∣ Pr

k←K

ϕk⟩⊗m Pr

|ψ⟩←μ

⟩⊗m ∣ ∣ ∣

slide-12
SLIDE 12

3 . 3

slide-13
SLIDE 13

Constructions of PRS's Constructions of PRS's

PRS's from quantum-secure PRFs or PRPs

4 . 1

slide-14
SLIDE 14

Random Phase States Random Phase States

Let be a quantum-secure pseudorandom function with key space , and . and are functions of the security parameter . Let be the

  • th root of unity. The family
  • f pseudorandom states of qubits is dened

PRF : K × X → X K X = {0, 1, 2, … , N − 1} N = 2n K N κ = exp(2πi/N) ωN N n | ⟩ = |x⟩. ϕk 1 N − − √ ∑

x∈X

ω

(x) PRFk N

4 . 2

slide-15
SLIDE 15

Properties and Applications Properties and Applications

5 . 1

slide-16
SLIDE 16

Cryptographic No-cloning Theorem Cryptographic No-cloning Theorem

Pseudorandom states are not efciently clonable

  • Theorem. For any PRS

, , , and any polynomial-time quantum algorithm , the success cloning probability Basic idea Haar random states are not clonable. So if pseudorandom states are clonable, one can use this property to distinguish it from the Haar random case by SWAP tests.

{| ⟩ ϕk }k∈K m ∈ poly(κ) > m m′ C ⟨(| ⟩⟨ | , C((| ⟩⟨ | )⟩ = negl(κ). E

k∈K

ϕk ϕk )

⊗m′

ϕk ϕk )

⊗m

slide-17
SLIDE 17

6 . 1

slide-18
SLIDE 18

Quantum Money Quantum Money

PRS's give rise to quantum money schemes

7 . 1

slide-19
SLIDE 19

What is Quantum Money What is Quantum Money

First proposed by Wiesner that arguably marks the beginning of quantum information

[Wiesner 1969]

The no-cloning theorem prevents counterfeiting of quantum money A money scheme is secure if (1) any valid banknote is accepted with high probability, and (2) any polynomial-time counterfeiter succeeds with negligible probability

7 . 2

slide-20
SLIDE 20

Quantum Money from PRS's Quantum Money from PRS's

For any with key space , we can dene a private-key quantum money scheme as follows: 1. generates the banknote 2. applies the projective measurement that accepts with probability For security proof, we need to strengthen the Cryptographic No- cloning Theorem so that it can handle the oracle call to .

PRS = {| ⟩ ϕk }k∈K K SPRS Bank(k) |$⟩ = | ⟩ ϕk Ver(k, ρ) ρ ⟨ |ρ| ⟩ ϕk ϕk Ver

7 . 3

slide-21
SLIDE 21

Entanglement in PRS Entanglement in PRS

Let be a family of PRS with security parameter . Consider the partition of the state into systems A and B each consisting of polynomial number of qubits in the security

  • parameter. We have
  • 1. The expected Schmidt rank of

for all and sufciently large .

  • 2. The expected entanglement accross the cut A:B is

.

{| ⟩ ϕk }k∈K κ | ⟩ ϕk | ⟩ ≥ ϕk κc c > 0 κ E( ) = ω(log κ) Ek ϕk

7 . 4

slide-22
SLIDE 22

Conclusions Conclusions

The denition of pseudorandom states Construction of PRS's Cryptographic No-cloning Theorems for PRS's Quantum money from PRS's Entanglement in PRS Open problems How about pseudorandom unitaries? Is quantum-secure OWF necessary? More applications?

8 . 1

slide-23
SLIDE 23

8 . 2

slide-24
SLIDE 24

Multiple PhD positions available at UTS:QSI Email: Zhengfeng.Ji@uts.edu.au

Advertisement Advertisement

9 . 1